Home > Papers > Data-Security-and-Computer-Security

 
  There are 74 papers published in subject: > since this site started.
  Results per page: 74 Total, 8 Pages | 1 2 3 4 Next > Last >>
Select Subject
   All (8497)
Agronomy (157)
Animal Husbandry,... (64)
Aquatic Science (16)
Astronomy (36)
Aviation (21)
Basic Medicine (182)
Biology (498)
Chemical Engineering (102)
Chemistry (631)
Civil and Archite... (105)
Clinical Medicine (230)
Computer Science ... (847)
Dynamic and Elect... (120)
Earth Science (118)
Economics (65)
Education (30)
Electrics, Commun... (900)
Energy Science an... (66)
Engineering and T... (14)
Environmental Sci... (140)
Food Science and ... (63)
Forestry (36)
Hydraulic Enginee... (40)
Mechanics (240)
Metallurgical Eng... (32)
Mine Engineering ... (38)
Nuclear Science a... (21)
Pharmacy (98)
Physics (914)
Preventive Medici... (36)
Psychology (20)
Security Science ... (17)
Sports Science (6)
Surveying and Map... (15)
Textile Science a... (16)
Traditional Chine... (55)
Transportation En... (52)
Select/Unselect all For Selected Papers

Saved Papers

Please enter a name for this paper to be shown in your personalized Saved Papers list
1. PPMT: Privacy-Preserving Genomic Data Sharing with Personalized Medicine Testing in Cloud Computing
  YUE Wei,HUANG Qinlong,YANG Yixian
  Computer Science and Technology 09 January 2020
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (600K B)
2. Secure Task Allocation Based on Anonymous Identity in Mobile Crowdsourcing
  HE Yue,HUANG Qinlong,HUANG Qinlong,NIU Xin-Xin,NIU Xin-Xin
  Computer Science and Technology 02 January 2020
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (887K B)
3. An Attack-Defense Trees model based on Analytic Hierarchy Process
  FEI Yu,JIANG Wenbao,Chalermpol Charnsripinyo
  Computer Science and Technology 12 March 2018
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (219K B)
4. controlled quantum secure direct communication with authentication based on four particle cluster state
  Zhao Zhezijian,Chen Xiubo
  Computer Science and Technology 03 January 2018
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (203K B)