Browse Title Index


 
Issue Title
 
Vol 12, No 3 (2011) Secure Data Aggregation Solution Based on Dynamic Multiple Cluster Key Management Model Abstract
Feng-Yu Lei, Cai Fu, Xi Li, Jing Chen
 
Vol 23, No 4 (2022) Secure Data Deduplication System with Efficient and Reliable Multi-Key Management in Cloud Storage Abstract   PDF
R. Vignesh, J. Preethi
 
Vol 21, No 7 (2020) Secure Federated Learning with Efficient Communication in Vehicle Network Abstract   PDF
Yinglong Li, Zhenjiang Zhang, Zhiyuan Zhang, Yi-Chih Kao
 
Vol 21, No 4 (2020) Secure Fine-grained Attribute-based Access Control with Hidden Policy for Electronic Health Record System Abstract   PDF
Sai Ji, Xin Jin, Jin-Feng Lai, Jian Shen
 
Vol 17, No 4 (2016) Secure HDFS Design Using Group Key Management System Abstract
Jungho Kang, Jaesoo Kim
 
Vol 20, No 4 (2019) Secure Human Authentication with Graphical Passwords Abstract   PDF
Zayabaatar Dagvatur, Aziz Mohaisen, Kyunghee Lee, DaeHun Nyang
 
Vol 23, No 5 (2022) Secure Judgment of Point and Line Relationship Against Malicious Adversaries and Its Applications Abstract
Xin Liu, Yang Xu, Gang Xu, Xiu-Bo Chen, Yu-Ling Chen
 
Vol 11, No 6 (2010) Secure Many-to-Many Multicast in Heterogeneous Networks Abstract
Junbeom Hur, Dongyoung Koo, Hyunsoo Yoon
 
Vol 15, No 5 (2014) Secure Nano Communication Abstract
Aneel Rahim, Paul Malone, Abdullah Sharaf Alghamdi
 
Vol 11, No 5 (2010) Secure Peer-to-Peer Multimedia Service in E-Commerce Environments Abstract
Xi Chen, Shi-Guo Lian
 
Vol 20, No 4 (2019) Secure Routing for WSN-Based Tactical-Level Intelligent Transportation Systems Abstract   PDF
Der-Chen Huang, Ying-Yi Chu, Yuan-Kwei Tzeng, Yu-Yi Chen, Wei-Ming Chen
 
Vol 5, No 2 (2004) Secure VPNs over IPv6 Networks: An Evaluation and its Integration in a Policy Management Framework Abstract
F'elix J. Garcia Clemente, Antonio F. Gómez Skarmeta, Gabriel López Millán, Gregorio Martinez Pérez
 
Vol 22, No 4 (2021) Secured Communication Method using Visual Secret Sharing Scheme for Color Images Abstract   PDF
John Blesswin A., Selva Mary G., Manoj Kumar S.
 
Vol 11, No 3 (2010) Securing Digital Images over the Internet Using a Robust Watermarking Scheme Abstract
Yun-Ho Lee, Sang-Soo Yeo, Jin Kwak
 
Vol 20, No 1 (2019) Security Analysis and Improvement on an Image Encryption Algorithm Using Chebyshev Generator Abstract   PDF
Tsu-Yang Wu, Xiaoning Fan, King-Hang Wang, Jeng-Shyang Pan, Chien-Ming Chen
 
Vol 14, No 2 (2013) Security Analysis of Block Cipher LED Abstract
Ki-Tae Jeong, Sang-Soo Yeo
 
Vol 17, No 2 (2016) Security Analysis of RFID Relay Attacks Abstract
Sghaier Guizani
 
Vol 24, No 3 (2023) Security Attack on Remote Sensing Equipment: PoIs Recognition Based on HW with Bi-LSTM Attention Abstract   PDF
Wei Jiang, Xianhua Zhang, Yanpeng Li, Chuansheng Chen, Jianfeng Zhu
 
Vol 11, No 3 (2010) Security Challenges for User-Oriented RFID Applications within the "Internet of Things" Abstract
G. P. Hancke, K. Markantonakis, K. E. Mayes
 
Vol 17, No 5 (2016) Security Challenges in Recent Internet Threats and Enhanced Security Service Model for Future IT Environments Abstract
Man-Sik Kim, Jeong-Kyu Lee, Jong Hyuk Park, Jung-Ho Kang
 
Vol 18, No 3 (2017) Security Collaborative Optimization Strategy for Perception Layer in Cognitive IoT Abstract
Ruijuan Zheng, Mingchuan Zhang, Qinghua Zheng, Qingtao Wu, Wangyang Wei
 
Vol 14, No 3 (2013) Security Evaluation of Double-Block-Length Hash Modes with Preimage Attacks on PGV Schemes Abstract
Duk-Jae Moon, Deuk-Jo Hong, Bon-Wook Koo, Seok-Hie Hong
 
Vol 7, No 3 (2006) Security Frame and Evaluation in Mobile Agent System Abstract
Su-Zhen Wang, Jia-Zhen Wang
 
Vol 8, No 1 (2007) Security Protocols for Wireless Local Area Networks (WLANs) and Cellular Networks Abstract
Sherali Zeadally, Farhan Siddiqui
 
Vol 10, No 1 (2009) Security Simulation Modeling Using Contract Net Protocol Abstract
Jong-Hyuk Park, Hee-Suk Seo
 
2101 - 2125 of 2572 Items << < 80 81 82 83 84 85 86 87 88 89 > >>