Home > Papers > Data-Security-and-Computer-Security

 
  There are 77 papers published in subject: > since this site started.
  Results per page: 77 Total, 8 Pages | << First < Previous 2 3 4 5 6 7 8 Next > Last >>
Select Subject
   All (8830)
Agronomy (158)
Animal Husbandry,... (64)
Aquatic Science (16)
Astronomy (36)
Aviation (22)
Basic Medicine (184)
Biology (504)
Chemical Engineering (103)
Chemistry (635)
Civil and Archite... (105)
Clinical Medicine (236)
Computer Science ... (924)
Dynamic and Elect... (121)
Earth Science (119)
Economics (67)
Education (31)
Electrics, Commun... (927)
Energy Science an... (67)
Engineering and T... (15)
Environmental Sci... (140)
Food Science and ... (63)
Forestry (36)
Hydraulic Enginee... (40)
Mechanics (240)
Metallurgical Eng... (32)
Mine Engineering ... (38)
Nuclear Science a... (21)
Pharmacy (98)
Physics (920)
Preventive Medici... (37)
Psychology (20)
Security Science ... (17)
Sports Science (6)
Surveying and Map... (15)
Textile Science a... (16)
Traditional Chine... (56)
Transportation En... (57)
Select/Unselect all For Selected Papers

Saved Papers

Please enter a name for this paper to be shown in your personalized Saved Papers list
1. Reexamination of the security of arbitrated quantum signatures
  ZHANG Ke-Jia, WEN Qiao-Yan, QIN Su-Juan
  Computer Science and Technology 04 February 2013
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
2. Characteristic Behavior Sequence Based Attack Detection Method for Browser Extension
  Xu Guangquan ,Junjie Wang
  Computer Science and Technology 08 January 2013
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
3. Parallel hash function using DM-based integer-valued chaotic maps network
  Liao Dong,Wang Xiaomin
  Computer Science and Technology 10 December 2012
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
4. Secure Cloud Storage with Data De-duplication
  Wan Lei,Wang Chunlu,Liu Chuanyi
  Computer Science and Technology 15 June 2012
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
5. Cryptanalysis of a Handover Authentication Protocol Based on Bilinear Pairing Functions
  He Debiao
  Computer Science and Technology 18 April 2012
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
6. Deniable Message Transmission Authenticator Based on Weak Signature Schemes
  TianHaibo
  Computer Science and Technology 10 April 2012
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
7. A trusted multi-party authentication scheme based on proactive-ElGamal threshold secret sharing system
  YANG Yuguang,CHAI Haiping
  Computer Science and Technology 12 March 2012
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
8. Conditionally Anonymous Ring Signature \ Scheme without Random Oracles
  Zeng Shengke,Qin Zhiguang,Lu Qing
  Computer Science and Technology 08 February 2012
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
9. A note on asynchronous multi-exponentiation algorithm using binary representation
  Da-Zhi Sun
  Computer Science and Technology 08 January 2012
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
10. Adaptive window method for multi-scalar multiplication under resource-constrained environments
  Da-Zhi Sun
  Computer Science and Technology 04 January 2012
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
Select/Unselect all For Selected Papers

Saved Papers

Please enter a name for this paper to be shown in your personalized Saved Papers list

Rank
  Results per page: 77 Total, 8 Pages | << First < Previous 2 3 4 5 6 7 8 Next > Last >>