Home > Papers > Data-Security-and-Computer-Security

 
  There are 76 papers published in subject: > since this site started.
  Results per page: 76 Total, 8 Pages | << First < Previous 1 2 3 4 5 6 7 Next > Last >>
Select Subject
   All (8816)
Agronomy (158)
Animal Husbandry,... (64)
Aquatic Science (16)
Astronomy (36)
Aviation (22)
Basic Medicine (184)
Biology (504)
Chemical Engineering (103)
Chemistry (635)
Civil and Archite... (105)
Clinical Medicine (236)
Computer Science ... (924)
Dynamic and Elect... (121)
Earth Science (119)
Economics (67)
Education (31)
Electrics, Commun... (927)
Energy Science an... (67)
Engineering and T... (15)
Environmental Sci... (140)
Food Science and ... (63)
Forestry (36)
Hydraulic Enginee... (40)
Mechanics (240)
Metallurgical Eng... (32)
Mine Engineering ... (38)
Nuclear Science a... (21)
Pharmacy (98)
Physics (920)
Preventive Medici... (37)
Psychology (20)
Security Science ... (17)
Sports Science (6)
Surveying and Map... (15)
Textile Science a... (16)
Traditional Chine... (56)
Transportation En... (57)
Select/Unselect all For Selected Papers

Saved Papers

Please enter a name for this paper to be shown in your personalized Saved Papers list
1. Sinkhole Attack Detection in Clustered-based Self-organizing Networks
  Zhang Fangjiao,ZHAI Lidong
  Computer Science and Technology 09 December 2013
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
2. Timed Release Program Obfuscation
  CHENG Rong ,ZHANG Fangguo
  Computer Science and Technology 06 December 2013
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
3. MD5 Calculation and Decryption Using CUDA on GPU
  LEI Mingshan,JIANG Yanjun,GAO Zhanchun
  Computer Science and Technology 04 December 2013
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
4. Research and Implementation based on RBAC role-based access model-based permissions system
  Liang Yongchao,Liu Peizhi
  Computer Science and Technology 29 September 2013
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
5. A new construction of proxy signature using chameleon hash function
  Li Yannan,Ni Jianbing,Yu Yong
  Computer Science and Technology 09 September 2013
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
6. Generalized Format-preserving Encryption for Character Data
  Ma Haoyu,Liu Zheli,Jia Chunfu,Yuan Ke
  Computer Science and Technology 04 May 2013
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
7. ModuleGuard: A Gatekeeper for Dynamic Module Loading Against Malware
  Fu Jianming,Ding Shuang,Peng Bichen
  Computer Science and Technology 13 April 2013
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
8. RESEARCH OF LOSSLESS DIGITAL WATERMARKING TECHNOLOGY
  Sun Jianguo,KOU Liang,XIA Songzhu
  Computer Science and Technology 14 March 2013
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
9. Matrix Embedding Based on Trellis Structure of Linear Block Codes
  LIU Weiwei,LIU Guangjie
  Computer Science and Technology 14 March 2013
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
10. Reexamination of the security of arbitrated quantum signatures
  ZHANG Ke-Jia, WEN Qiao-Yan, QIN Su-Juan
  Computer Science and Technology 04 February 2013
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
Select/Unselect all For Selected Papers

Saved Papers

Please enter a name for this paper to be shown in your personalized Saved Papers list

Rank
  Results per page: 76 Total, 8 Pages | << First < Previous 1 2 3 4 5 6 7 Next > Last >>