Home > Papers > Data-Security-and-Computer-Security

 
  There are 76 papers published in subject: > since this site started.
  Results per page: 76 Total, 8 Pages | 1 2 3 4 Next > Last >>
Select Subject
   All (8798)
Agronomy (158)
Animal Husbandry,... (64)
Aquatic Science (16)
Astronomy (36)
Aviation (22)
Basic Medicine (184)
Biology (504)
Chemical Engineering (103)
Chemistry (635)
Civil and Archite... (105)
Clinical Medicine (236)
Computer Science ... (924)
Dynamic and Elect... (121)
Earth Science (119)
Economics (67)
Education (31)
Electrics, Commun... (927)
Energy Science an... (67)
Engineering and T... (15)
Environmental Sci... (140)
Food Science and ... (63)
Forestry (36)
Hydraulic Enginee... (40)
Mechanics (240)
Metallurgical Eng... (32)
Mine Engineering ... (38)
Nuclear Science a... (21)
Pharmacy (98)
Physics (920)
Preventive Medici... (37)
Psychology (20)
Security Science ... (17)
Sports Science (6)
Surveying and Map... (15)
Textile Science a... (16)
Traditional Chine... (56)
Transportation En... (57)
Select/Unselect all For Selected Papers

Saved Papers

Please enter a name for this paper to be shown in your personalized Saved Papers list
1. DTAME: A Unified Approach for ABAC Policy Mining and Efficient Evaluation Using Decision Trees
  LAN Ze-Jun, GUAN Jian-Feng
  Computer Science and Technology 28 February 2024
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
2. User Authentication from Smartwatch Photoplethysmography sensor
  TAN ZhiHao,HUANG Qinlong,YANG Yixian
  Computer Science and Technology 22 March 2021
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
3. PPMT: Privacy-Preserving Genomic Data Sharing with Personalized Medicine Testing in Cloud Computing
  YUE Wei,HUANG Qinlong,YANG Yixian
  Computer Science and Technology 09 January 2020
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
4. Secure Task Allocation Based on Anonymous Identity in Mobile Crowdsourcing
  HE Yue,HUANG Qinlong,HUANG Qinlong,NIU Xin-Xin,NIU Xin-Xin
  Computer Science and Technology 02 January 2020
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
5. An Attack-Defense Trees model based on Analytic Hierarchy Process
  FEI Yu,JIANG Wenbao,Chalermpol Charnsripinyo
  Computer Science and Technology 12 March 2018
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
6. controlled quantum secure direct communication with authentication based on four particle cluster state
  Zhao Zhezijian,Chen Xiubo
  Computer Science and Technology 03 January 2018
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
7. A More Efficient Attribute-Based Encryption Scheme With Hidden Access Structure Policy
  Qian~Wang, Zhenfu~Cao
  Computer Science and Technology 06 May 2017
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
8. A Note on Hardness of Testing Functions
  Lu Haining
  Computer Science and Technology 27 June 2016
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
9. Key Recovery on Several Matrix Public-Key Encryption Schemes
  WANG Hou-Zhen,ZHANG Huan-Guo, TANG Shao-Hua
  Computer Science and Technology 01 June 2016
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
10. New Public-Key Cryptosystem Based on the Morphism of Polynomials Problem
  WANG Hou-Zhen,ZHANG Huan-Guo, MAO Shao-Wu,WU Wan-Qing
  Computer Science and Technology 19 May 2016
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
Select/Unselect all For Selected Papers

Saved Papers

Please enter a name for this paper to be shown in your personalized Saved Papers list

Rank
  Results per page: 76 Total, 8 Pages | 1 2 3 4 Next > Last >>