Home > Papers > Data-Security-and-Computer-Security

 
  There are 77 papers published in subject: > since this site started.
  Results per page: 77 Total, 8 Pages | << First < Previous 3 4 5 6 7 8 Next > Last >>
Select Subject
   All (8830)
Agronomy (158)
Animal Husbandry,... (64)
Aquatic Science (16)
Astronomy (36)
Aviation (22)
Basic Medicine (184)
Biology (504)
Chemical Engineering (103)
Chemistry (635)
Civil and Archite... (105)
Clinical Medicine (236)
Computer Science ... (924)
Dynamic and Elect... (121)
Earth Science (119)
Economics (67)
Education (31)
Electrics, Commun... (927)
Energy Science an... (67)
Engineering and T... (15)
Environmental Sci... (140)
Food Science and ... (63)
Forestry (36)
Hydraulic Enginee... (40)
Mechanics (240)
Metallurgical Eng... (32)
Mine Engineering ... (38)
Nuclear Science a... (21)
Pharmacy (98)
Physics (920)
Preventive Medici... (37)
Psychology (20)
Security Science ... (17)
Sports Science (6)
Surveying and Map... (15)
Textile Science a... (16)
Traditional Chine... (56)
Transportation En... (57)
Select/Unselect all For Selected Papers

Saved Papers

Please enter a name for this paper to be shown in your personalized Saved Papers list
1. Joint Error Linear Complexity of pn-Periodic Multisequences Over Fp
  Ming Su
  Computer Science and Technology 29 November 2011
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
2. Analyze the security of REESSE1+ Public Key Cryptosystem
  Gu Haihua,Gu Dawu,Xie Wenlu
  Computer Science and Technology 01 November 2011
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
3. Refinement of Miller's Algorithm over Huff Curves
  Gu Haihua,Gu Dawu ,Xie Wenlu
  Computer Science and Technology 28 October 2011
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
4. A new strong multiple designated verifiers signature for broadcast propagation
  Tian Haibo
  Computer Science and Technology 21 August 2011
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
5. Modeling and Analysis of Self-stopping BT Worms Using Dynamic Hit List in P2P Networks
  Luo Jiaqing,Xiao Bin,Zhou Shijie
  Computer Science and Technology 05 January 2011
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
6. Analyzing Security Issues in Peer-to-Peer Networks with Threat Modeling
  Li Sai
  Computer Science and Technology 15 November 2010
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
7. Some Basic Principles for Proxy Signature Schemes Based on DLP
  Xue Qingshui ,Li Fengying,Cao Zhenfu
  Computer Science and Technology 06 April 2010
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
8. applications of proxy re-encryption in multi-decryptor encryption environments
  Wang Hongbing,Cao Zhenfu
  Computer Science and Technology 01 April 2010
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
9. A trust management model based on reputation for virtual community
  Zhao Shuqin ,Guo Yucui,Lv Shang
  Computer Science and Technology 09 March 2010
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
10. Centroid-based semi-fragile audio watermarking in hybrid domain
  Hong-Xia Wang,Ming-Quan Fan
  Computer Science and Technology 31 December 2009
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
Select/Unselect all For Selected Papers

Saved Papers

Please enter a name for this paper to be shown in your personalized Saved Papers list

Rank
  Results per page: 77 Total, 8 Pages | << First < Previous 3 4 5 6 7 8 Next > Last >>