Home > Papers > Data-Security-and-Computer-Security

 
  There are 77 papers published in subject: > since this site started.
  Results per page: 77 Total, 8 Pages | << First < Previous 4 5 6 7 8 Next > Last >>
Select Subject
   All (8830)
Agronomy (158)
Animal Husbandry,... (64)
Aquatic Science (16)
Astronomy (36)
Aviation (22)
Basic Medicine (184)
Biology (504)
Chemical Engineering (103)
Chemistry (635)
Civil and Archite... (105)
Clinical Medicine (236)
Computer Science ... (924)
Dynamic and Elect... (121)
Earth Science (119)
Economics (67)
Education (31)
Electrics, Commun... (927)
Energy Science an... (67)
Engineering and T... (15)
Environmental Sci... (140)
Food Science and ... (63)
Forestry (36)
Hydraulic Enginee... (40)
Mechanics (240)
Metallurgical Eng... (32)
Mine Engineering ... (38)
Nuclear Science a... (21)
Pharmacy (98)
Physics (920)
Preventive Medici... (37)
Psychology (20)
Security Science ... (17)
Sports Science (6)
Surveying and Map... (15)
Textile Science a... (16)
Traditional Chine... (56)
Transportation En... (57)
Select/Unselect all For Selected Papers

Saved Papers

Please enter a name for this paper to be shown in your personalized Saved Papers list
1. Three New Approaches to Privacy-preserving Add to Multiply Protocol and Its Application
  Youwen Zhu,Liusheng Huang,Wei Yang,Dong Li,Yonglong Luo,Fan Dong
  Computer Science and Technology 30 December 2009
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
2. A Novel Image-hiding Scheme Based on Quantizing Factor and Matching Factor in DWT
  Xiang Yong,Chen Yong
  Computer Science and Technology 23 November 2009
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
3. Efficient Pairing Computation on Elliptic Curves in Hessian form
  Gu Haihua,Gu Dawu
  Computer Science and Technology 19 November 2009
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
4. Fast Identity-Based Encryption Using Combined Public Keys
  Jiqiang Liu,Sheng Zhong
  Computer Science and Technology 20 March 2009
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
5. An Efficient Hardware-based PIR Scheme
  Lan Tian,Qin Zhiguang
  Computer Science and Technology 09 January 2009
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
6. Binary-Price Proxy Auction Protocol
  Lan Tian,Qin Zhiguang
  Computer Science and Technology 07 January 2009
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
7. Research on security of e-payment in e-commerce
  DENG Guo-Xu,WANG Zhi-Qian
  Computer Science and Technology 24 September 2008
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
8. An Improved Key Distribution Scheme with Self-healing and Revocation Property for Wireless Sensor Network
  Yanfei Zheng,Mi Wen,Kefei Chen
  Computer Science and Technology 03 February 2008
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
9. Advanced Framework for Iterative Hash Functions---C-hash
  Zhimin Li,Bo Yang,Lin Li,Shihui Zheng,Yixian Yang,Zhang Zhihui
  Computer Science and Technology 14 November 2007
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
10. Threats to IM and Security Mechanism Analysis of XMPP
  Zhenxing Cui,Zhihua Gu
  Computer Science and Technology 02 July 2007
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
Select/Unselect all For Selected Papers

Saved Papers

Please enter a name for this paper to be shown in your personalized Saved Papers list

Rank
  Results per page: 77 Total, 8 Pages | << First < Previous 4 5 6 7 8 Next > Last >>