The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "I. J. Network Security"( http://dblp.L3S.de/Venues/I._J._Network_Security )

URL (DBLP): http://dblp.uni-trier.de/db/journals/ijnsec

Publication years (Num. hits)
2005 (25) 2006 (67) 2007 (81) 2008 (94) 2009 (69) 2010 (54) 2011 (40) 2012 (43) 2013 (60) 2014 (62) 2015 (81) 2016 (127) 2017 (118) 2018 (134) 2019 (61)
Publication types (Num. hits)
article(1116)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 1116 publication records. Showing 1116 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Gaimei Gao, Xinguang Peng, Lizhong Jin Efficient Access Control Scheme with Certificateless Signcryption for Wireless Body Area Networks. Search on Bibsonomy I. J. Network Security The full citation details ... 2019 DBLP  BibTeX  RDF
1Marwa R. Mohamed, Abdurrahman A. Nasr, Ibrahim F. Tarrad, Mohamed Z. Abdulmageed Exploiting Incremental Classifiers for the Training of an Adaptive Intrusion Detection Model. Search on Bibsonomy I. J. Network Security The full citation details ... 2019 DBLP  BibTeX  RDF
1Subhas Chandra Sahana, Bubu Bhuyan A Provable Secure Short Signature Scheme Based on Bilinear Pairing over Elliptic Curve. Search on Bibsonomy I. J. Network Security The full citation details ... 2019 DBLP  BibTeX  RDF
1Ashu Sharma, Sanjay Kumar Sahay Group-Wise Classification Approach to Improve Android Malicious Apps Detection Accuracy. Search on Bibsonomy I. J. Network Security The full citation details ... 2019 DBLP  BibTeX  RDF
1Jialiang Song, Jihong Han, Xirui Zhang, Lulu Shao, Yang Wang OCFSII: A New Feature Selection Based on Orthogonal Centroid both Inter-class and Intra-class for Vulnerability Classification. Search on Bibsonomy I. J. Network Security The full citation details ... 2019 DBLP  BibTeX  RDF
1Zhenhua Liu, Yaqing Fan Provably Secure Searchable Attribute-Based Authenticated Encryption Scheme. Search on Bibsonomy I. J. Network Security The full citation details ... 2019 DBLP  BibTeX  RDF
1Xueqin Zhang, Baoping Wang, Wenpeng Zhang 0004 A Robust Authentication Protocol for Multi-server Architecture Using Elliptic Curve Cryptography. Search on Bibsonomy I. J. Network Security The full citation details ... 2019 DBLP  BibTeX  RDF
1Yunbin He Identification and Processing of Network Abnormal Events Based on Network Intrusion Detection Algorithm. Search on Bibsonomy I. J. Network Security The full citation details ... 2019 DBLP  BibTeX  RDF
1Bader Saeed Alghamdi, Mohamed Elnamaky, Mohammed Amer Arafah, Maazen Alsabaan, Saad Haj Bakry A Context Establishment Framework for Cloud Computing Information Security Risk Management Based on the STOPE View. Search on Bibsonomy I. J. Network Security The full citation details ... 2019 DBLP  BibTeX  RDF
1Yang Ming, Hongping Yuan Fully Secure Anonymous Identity Based Broadcast Encryption with Group of Prime Order. Search on Bibsonomy I. J. Network Security The full citation details ... 2019 DBLP  BibTeX  RDF
1Lijuan Guo, Xuelian Li, Juntao Gao Multi-party Fair Exchange Protocol with Smart Contract on Bitcoin. Search on Bibsonomy I. J. Network Security The full citation details ... 2019 DBLP  BibTeX  RDF
1Xiuxia Tian, Fuliang Tian, Anqin Zhang, Xi Chen Privacy-Preserving and Dynamic Authentication Scheme for Smart Metering. Search on Bibsonomy I. J. Network Security The full citation details ... 2019 DBLP  BibTeX  RDF
1Zhong-Cheng Li, Jian-Hua Huang, Da-Qi Gao, Ya-Hui Jiang, Li Fan ISCP: An Improved Blockchain Consensus Protocol. Search on Bibsonomy I. J. Network Security The full citation details ... 2019 DBLP  BibTeX  RDF
1Amiruddin Amiruddin, Anak Agung Putri Ratna, Riri Fitri Sari Construction and Analysis of Key Generation Algorithms Based on Modified Fibonacci and Scrambling Factors for Privacy Preservation. Search on Bibsonomy I. J. Network Security The full citation details ... 2019 DBLP  BibTeX  RDF
1Tzu-Chun Lin, Ting-Yi Yeh, Min-Shiang Hwang Cryptanalysis of an ID-based Deniable Threshold Ring Authentication. Search on Bibsonomy I. J. Network Security The full citation details ... 2019 DBLP  BibTeX  RDF
1Azidine Guezzaz, Ahmed Asimi, Younes Asimi, Zakariae Tbatou, Yassine Sadqi A Global Intrusion Detection System using PcapSockS Sniffer and Multilayer Perceptron Classifier. Search on Bibsonomy I. J. Network Security The full citation details ... 2019 DBLP  BibTeX  RDF
1M. Vaneeta, S. Swapna Kumar NPKG: Novel Pairwise Key Generation for Resisting Key-based Threats in Wireless Sensor Network. Search on Bibsonomy I. J. Network Security The full citation details ... 2019 DBLP  BibTeX  RDF
1Maram Bani Younes Secure Traffic Efficiency Control Protocol for Downtown Vehicular Networks. Search on Bibsonomy I. J. Network Security The full citation details ... 2019 DBLP  BibTeX  RDF
1Dasari Kalyani, R. Sridevi New Hierarchical Identity Based Encryption with maximum hierarchy. Search on Bibsonomy I. J. Network Security The full citation details ... 2019 DBLP  BibTeX  RDF
1Joshua C. Dagadu, Jianping Li, Emelia Opoku Aboagye, Faith K. Deynu Medical Image Encryption Scheme Based on Multiple Chaos and DNA Coding. Search on Bibsonomy I. J. Network Security The full citation details ... 2019 DBLP  BibTeX  RDF
1Di Fan, Feng Xiao, Dan Tang A New Erasure Code Decoding Algorithm. Search on Bibsonomy I. J. Network Security The full citation details ... 2019 DBLP  BibTeX  RDF
1Gaoxiang Lou, Zongyan Cai A Cloud Computing Oriented Neural Network for Resource Demands and Management Scheduling. Search on Bibsonomy I. J. Network Security The full citation details ... 2019 DBLP  BibTeX  RDF
1Laura Victoria Morales Medina, David Delgado-Ruiz, Sandra Julieta Rueda Comprehgensive Security for Body Area Networks: A Survey. Search on Bibsonomy I. J. Network Security The full citation details ... 2019 DBLP  BibTeX  RDF
1Daouda Ahmat, Marayi Choroma, Tegawendé F. Bissyandé Multipath Key Exchange Scheme Based on the Diffie-Hellman Protocol and the Shamir Threshold. Search on Bibsonomy I. J. Network Security The full citation details ... 2019 DBLP  BibTeX  RDF
1Weimin Kang, Simiao Wang Virus Propagation Behavior Simulation Based on Node Movement Model of Wireless Multi-hop Network. Search on Bibsonomy I. J. Network Security The full citation details ... 2019 DBLP  BibTeX  RDF
1Akbar Mahmoodi Rishakani, Y. Fekri Dabanloo, Seyed Mojtaba Dehnavi, M. R. Mirzaee Shamsabad, Nasour Bagheri A Note on the Construction of Lightweight Cyclic MDS Matrices. Search on Bibsonomy I. J. Network Security The full citation details ... 2019 DBLP  BibTeX  RDF
1Dany Eka Saputra, Sarwono Sutikno, Suhono Harso Supangkat General Model for Secure Electronic Cash Scheme. Search on Bibsonomy I. J. Network Security The full citation details ... 2019 DBLP  BibTeX  RDF
1Rup Kumar Deka, Dhruba Kumar Bhattacharyya, Jugal Kumar Kalita Granger Causality in TCP Flooding Attack. Search on Bibsonomy I. J. Network Security The full citation details ... 2019 DBLP  BibTeX  RDF
1Mengting Hu, Hang Gao, Tiegang Gao Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data by Chaos Based Arithmetic Coding and Confusion. Search on Bibsonomy I. J. Network Security The full citation details ... 2019 DBLP  BibTeX  RDF
1Tanit Somleewong, Kiattisak Maichalernnukul Secure Multiple-Antenna Ultrawideband System: A Wireless Physical-Layer Security Perspective. Search on Bibsonomy I. J. Network Security The full citation details ... 2019 DBLP  BibTeX  RDF
1Xingbo Wang Two Number-guessing Problems Plus Applications in Cryptography. Search on Bibsonomy I. J. Network Security The full citation details ... 2019 DBLP  BibTeX  RDF
1Chunhu Li, Guangchun Luo, Chunbao Li An Image Encryption Scheme Based on The Three-dimensional Chaotic Logistic Map. Search on Bibsonomy I. J. Network Security The full citation details ... 2019 DBLP  BibTeX  RDF
1Feng Xiao, Di Fan, Dan Tang A Fast Recovery Method for Single Disk Failure Based on EVENODD. Search on Bibsonomy I. J. Network Security The full citation details ... 2019 DBLP  BibTeX  RDF
1Ghassan Sabeeh Mahmood, Dong Jun Huang, Baidaa Abdulrahman Jaleel Achieving an Effective, Confidentiality and Integrity of Data in Cloud Computing. Search on Bibsonomy I. J. Network Security The full citation details ... 2019 DBLP  BibTeX  RDF
1Ali Mansouri, Mohamed Salim Bouhlel Trust in Ad Hoc Networks: A New Model Based on Clustering Algorithm. Search on Bibsonomy I. J. Network Security The full citation details ... 2019 DBLP  BibTeX  RDF
1Yingsu Qi Computer Real-Time Location Forensics Method for Network Intrusion Crimes. Search on Bibsonomy I. J. Network Security The full citation details ... 2019 DBLP  BibTeX  RDF
1Kittur P. Kibiwott, Fengli Zhang, Kimeli Victor K., Anyembe Andrew Omala, Eugene Opoku-Mensah Privacy Preservation for eHealth Big Data in Cloud Accessed Using Resource-Constrained Devices: Survey. Search on Bibsonomy I. J. Network Security The full citation details ... 2019 DBLP  BibTeX  RDF
1Yan Wang, Xueming Ren, Shunbo Li 2-Adic Complexity of Sequences Generated by T-Functions. Search on Bibsonomy I. J. Network Security The full citation details ... 2019 DBLP  BibTeX  RDF
1Chen Li, Zhenhua Liu A Secure Privacy-Preserving Cloud Auditing Scheme with Data Deduplication. Search on Bibsonomy I. J. Network Security The full citation details ... 2019 DBLP  BibTeX  RDF
1Ye Lu, Tao Feng Cryptography Security Designs and Enhancements of DNP3-SA Protocol Based on Trusted Computing. Search on Bibsonomy I. J. Network Security The full citation details ... 2019 DBLP  BibTeX  RDF
1Chokri Nouar, Zine El Abidine Guennoun A Pseudo Random Bit Generator Based on a Modified Chaotic Map. Search on Bibsonomy I. J. Network Security The full citation details ... 2019 DBLP  BibTeX  RDF
1Qingfeng Cheng, Xinglong Zhang Comments on Privacy-Preserving Yoking Proof with Key Exchange in the Three-Party Setting. Search on Bibsonomy I. J. Network Security The full citation details ... 2019 DBLP  BibTeX  RDF
1Haichun Zhao, Xuanxia Yao, Xuefeng Zheng Privacy-preserving TPA Auditing Scheme Based on Skip List for Cloud Storage. Search on Bibsonomy I. J. Network Security The full citation details ... 2019 DBLP  BibTeX  RDF
1Huaijin Liu, Yonghong Chen, Hui Tian 0002, Tian Wang 0001 A Security and Efficient Data Aggregation Scheme for Cloud-Assisted Wireless Body Area Network. Search on Bibsonomy I. J. Network Security The full citation details ... 2019 DBLP  BibTeX  RDF
1Thai-Ngoc Luong, Thanh Tu Vo AODVDC: An Improved Protocol Prevents Whirlwind Attacks in Mobile Ad hoc Network. Search on Bibsonomy I. J. Network Security The full citation details ... 2019 DBLP  BibTeX  RDF
1Bowen Zhu, Yonghong Chen, Yiqiao Cai Three Kinds of Network Security Situation Awareness Model Based on Big Data. Search on Bibsonomy I. J. Network Security The full citation details ... 2019 DBLP  BibTeX  RDF
1Dinh-Thuan Do On The Secrecy Performance of Wireless Powered Device to Device Systems. Search on Bibsonomy I. J. Network Security The full citation details ... 2019 DBLP  BibTeX  RDF
1RatnaKumari Challa, VijayaKumari Gunta Additively LWE Based Homomorphic Encryption for Compact Devices with Enhanced Security. Search on Bibsonomy I. J. Network Security The full citation details ... 2019 DBLP  BibTeX  RDF
1Shuang-Gen Liu, Rong-Rong Wang, Yun-Qi Li, Can-Liang Zhai An Improved Ternary Montgomery Ladder Algorithm on Elliptic Curves over GF(3^m). Search on Bibsonomy I. J. Network Security The full citation details ... 2019 DBLP  BibTeX  RDF
1Yanjun Liu, Chin-Chen Chang A Cloud-assisted Passenger Authentication Scheme for Japan Rail Pass Based on Image Morphing. Search on Bibsonomy I. J. Network Security The full citation details ... 2019 DBLP  BibTeX  RDF
1Surmila Thokchom, Dilip Kr. Saikia Privacy Preserving and Public Auditable Integrity Checking on Dynamic Cloud Data. Search on Bibsonomy I. J. Network Security The full citation details ... 2019 DBLP  BibTeX  RDF
1Yuan Zhao, Yanyan Zhang Safety Protection of E-Commerce Logistics Information Data Under The Background Of Big Data. Search on Bibsonomy I. J. Network Security The full citation details ... 2019 DBLP  BibTeX  RDF
1Huiyan Chen, Yanshuo Zhang, Zongjie Wan, Chenchen Zhang Tight Proofs of Identity-based Signatures without Random Oracle. Search on Bibsonomy I. J. Network Security The full citation details ... 2019 DBLP  BibTeX  RDF
1Ahmed El-Yahyaoui, Mohamed Dâfir Ech-Cherif El Kettani An Efficient Fully Homomorphic Encryption Scheme. Search on Bibsonomy I. J. Network Security The full citation details ... 2019 DBLP  BibTeX  RDF
1Qiu-Yu Zhang, Tao Zhang, Si-Bin Qiao, Dong-Fang Wu Spectrogram-based Efficient Perceptual Hashing Scheme for Speech Identification. Search on Bibsonomy I. J. Network Security The full citation details ... 2019 DBLP  BibTeX  RDF
1Shu-Fen Chiou, Hsieh-Tsen Pan, Eko Fajar Cahyadi, Min-Shiang Hwang Cryptanalysis of the Mutual Authentication and Key Agreement Protocol with Smart Cards for Wireless Communications. Search on Bibsonomy I. J. Network Security The full citation details ... 2019 DBLP  BibTeX  RDF
1V. Sudarsan Rao, N. Satyanarayana A Secure and Efficient Computation Outsourcing Scheme for Multi-Users. Search on Bibsonomy I. J. Network Security The full citation details ... 2019 DBLP  BibTeX  RDF
1Sunghyuck Hong Authentication Techniques in the Internet of Things Environment: A Survey. Search on Bibsonomy I. J. Network Security The full citation details ... 2019 DBLP  BibTeX  RDF
1Wien Hong, Shuozhen Zheng, Xiaoyu Zhou On Security Improvement of Adaptive Pixel Pair Matching with Modified Searching Mechanism. Search on Bibsonomy I. J. Network Security The full citation details ... 2019 DBLP  BibTeX  RDF
1Cheng Li, Zhiyong Zhang, Guoqin Chang Multimedia Social Network Authorization Scheme of Comparison-based Encryption. Search on Bibsonomy I. J. Network Security The full citation details ... 2019 DBLP  BibTeX  RDF
1Hossam Diab A Selective Self-adaptive Image Cryptosystem Based on Bit-planes Decomposition. Search on Bibsonomy I. J. Network Security The full citation details ... 2019 DBLP  BibTeX  RDF
1Lei Zhang Supervision and Investigation of Internet Fraud Crimes. Search on Bibsonomy I. J. Network Security The full citation details ... 2018 DBLP  BibTeX  RDF
1Cheng-Yi Tsai, Pi-Fang Ho, Min-Shiang Hwang A Secure Group Signature Scheme. Search on Bibsonomy I. J. Network Security The full citation details ... 2018 DBLP  BibTeX  RDF
1Septafiansyah Dwi Putra, Ma'muri, Sarwono Sutikno, Yusuf Kurniawan, Adang Suwandi Ahmad Design of an AES Device as Device Under Test in a DPA Attack. Search on Bibsonomy I. J. Network Security The full citation details ... 2018 DBLP  BibTeX  RDF
1Leyou Zhang, Hongjian Yin Recipient Anonymous Ciphertext-Policy Attribute-based Broadcast Encryption. Search on Bibsonomy I. J. Network Security The full citation details ... 2018 DBLP  BibTeX  RDF
1Bei Xie, Jiaohua Qin, Xuyu Xiang, Hao Li, Lili Pan An Image Retrieval Algorithm Based on Gist and Sift Features. Search on Bibsonomy I. J. Network Security The full citation details ... 2018 DBLP  BibTeX  RDF
1Gang Lu, Linyuan Xue, Xuyun Nie, Zhiguang Qin Cryptanalysis of Novel Extended Multivariate Public Key Cryptosystem with Invertible Cycle. Search on Bibsonomy I. J. Network Security The full citation details ... 2018 DBLP  BibTeX  RDF
1Rui Xie, Jie Ling, Dao-wei Liu A Wireless Key Generation Algorithm for RFID System Based on Bit Operation. Search on Bibsonomy I. J. Network Security The full citation details ... 2018 DBLP  BibTeX  RDF
1Xu Wu Study on Trust Model for Multi-users in Cloud Computing. Search on Bibsonomy I. J. Network Security The full citation details ... 2018 DBLP  BibTeX  RDF
1Yu-Lun Wang, Jau-Ji Shen, Min-Shiang Hwang A Survey of Reversible Data Hiding for VQ-Compressed Images. Search on Bibsonomy I. J. Network Security The full citation details ... 2018 DBLP  BibTeX  RDF
1Shaoquan Jiang, Min Li, Zailiang Tang A New Scheme for Source-location Privacy in Wireless Sensor Networks. Search on Bibsonomy I. J. Network Security The full citation details ... 2018 DBLP  BibTeX  RDF
1Jian-Hua Huang, Liang-Jie Chen, Fan-Chao Li, Ze Fang Security Quantification Method for Intrusion Tolerance Systems Based on Multi-recovery. Search on Bibsonomy I. J. Network Security The full citation details ... 2018 DBLP  BibTeX  RDF
1Naresh Babu Muthu Mohan, Ardhani Sathya Narayana Chakravarthy, Cherukuri Ravindranath Cryptanalysis of Design and Analysis of a Provably Secure Multi-server Authentication Scheme. Search on Bibsonomy I. J. Network Security The full citation details ... 2018 DBLP  BibTeX  RDF
1Kittur P. Kibiwott, Fengli Zhang, Anyembe Andrew Omala, Daniel Adu-Gyamfi Secure Cloudlet-based eHealth Big Data System with Fine-Grained Access Control and Outsourcing Decryption from ABE. Search on Bibsonomy I. J. Network Security The full citation details ... 2018 DBLP  BibTeX  RDF
1Dindayal Mahto, Dilip Kumar Yadav Performance Analysis of RSA and Elliptic Curve Cryptography. Search on Bibsonomy I. J. Network Security The full citation details ... 2018 DBLP  BibTeX  RDF
1M. Seshadri Srinath, Venkatachalam Chandrasekaran Isogeny-based Quantum-resistant Undeniable Blind Signature Scheme. Search on Bibsonomy I. J. Network Security The full citation details ... 2018 DBLP  BibTeX  RDF
1Wenjie Yang, Min-Rong Chen, Guo-Qiang Zeng Cryptanalysis of Two Strongly Unforgeable Identity-based Signatures in the Standard Model. Search on Bibsonomy I. J. Network Security The full citation details ... 2018 DBLP  BibTeX  RDF
1V. Padmavathi, B. Vishnu Vardhan, Addepalli V. N. Krishna Provably Secure Quantum Key Distribution By Applying Quantum Gate. Search on Bibsonomy I. J. Network Security The full citation details ... 2018 DBLP  BibTeX  RDF
1P. Kavitha, Rajeswari Mukesh Detection of Impersonation Attack in MANET Using Polynomial Reduction Algorithm. Search on Bibsonomy I. J. Network Security The full citation details ... 2018 DBLP  BibTeX  RDF
1Mohammed Abdel-Azim, Hossam El-Din Salah, Menas Ebrahim Eissa IDS Against Black-Hole Attack for MANET. Search on Bibsonomy I. J. Network Security The full citation details ... 2018 DBLP  BibTeX  RDF
1Ahmed A. Elngar IoT-based Efficient Tamper Detection Mechanism for Healthcare Application. Search on Bibsonomy I. J. Network Security The full citation details ... 2018 DBLP  BibTeX  RDF
1Hongfeng Zhu, Junlin Liu Provably Secure and Repeatable Authenticated Privacy-Protection Scheme Using Chaotic Maps with Distributed Architecture. Search on Bibsonomy I. J. Network Security The full citation details ... 2018 DBLP  BibTeX  RDF
1Mourad Abdeljebbar, Rachid El Kouch Security Improvements of EPS-AKA Protocol. Search on Bibsonomy I. J. Network Security The full citation details ... 2018 DBLP  BibTeX  RDF
1Eman Tarek, Osama Ouda, Ahmed Atwan Image-based Multimodal Biometric Authentication Using Double Random Phase Encoding. Search on Bibsonomy I. J. Network Security The full citation details ... 2018 DBLP  BibTeX  RDF
1Chunlin Jiang, Shi-lan Wu, Ke Gu New Kind of Delegation-based Anonymous Authentication Scheme for Wireless Roaming Networks. Search on Bibsonomy I. J. Network Security The full citation details ... 2018 DBLP  BibTeX  RDF
1Mikhail Styugin Establishing Systems Secure from Research with Implementation in Encryption Algorithms. Search on Bibsonomy I. J. Network Security The full citation details ... 2018 DBLP  BibTeX  RDF
1Abdelrahman Desoky Uniform Resource Locator Based Steganography Methodology. Search on Bibsonomy I. J. Network Security The full citation details ... 2018 DBLP  BibTeX  RDF
1Li Lin A Detection and Defense Technology for Information-stealing and Deceitful Trojan Viruses Based on Behavioral Features. Search on Bibsonomy I. J. Network Security The full citation details ... 2018 DBLP  BibTeX  RDF
1Shin-Yan Chiou, Wen-Tsai Ko, Erl-Huei Lu A Secure ECC-based Mobile RFID Mutual Authentication Protocol and Its Application. Search on Bibsonomy I. J. Network Security The full citation details ... 2018 DBLP  BibTeX  RDF
1Chandrashekhar Meshram, Sarita Gajbhiye Meshram, Cheng-Chi Lee Constructing Provably Secure ID-based Beta Cryptographic Scheme in Random Oracle. Search on Bibsonomy I. J. Network Security The full citation details ... 2018 DBLP  BibTeX  RDF
1Ming Yang, Rong Jiang, Tilei Gao, Wanyu Xie, Jia Wang Research on Cloud Computing Security Risk Assessment Based on Information Entropy and Markov Chain. Search on Bibsonomy I. J. Network Security The full citation details ... 2018 DBLP  BibTeX  RDF
1Cen Zuo Defense of Computer Network Viruses Based on Data Mining Technology. Search on Bibsonomy I. J. Network Security The full citation details ... 2018 DBLP  BibTeX  RDF
1Dan Tang, Yaqiang Wang, Haopeng Yang Array Erasure Codes with Preset Fault Tolerance Capability. Search on Bibsonomy I. J. Network Security The full citation details ... 2018 DBLP  BibTeX  RDF
1Yu-Lun Wang, Jau-Ji Shen, Min-Shiang Hwang A Novel Dual Image-based High Payload Reversible Hiding Technique Using LSB Matching. Search on Bibsonomy I. J. Network Security The full citation details ... 2018 DBLP  BibTeX  RDF
1Qiuhua Wang, Hongxia Zhang, Qiuyun Lyu, Xiaojun Wang, Jianrong Bao A Novel Physical Channel Characteristics-based Channel Hopping Scheme for Jamming-resistant in Wireless Communication. Search on Bibsonomy I. J. Network Security The full citation details ... 2018 DBLP  BibTeX  RDF
1Nyamsuren Vaanchig, Hu Xiong, Wei Chen, Zhiguang Qin Achieving Collaborative Cloud Data Storage by Key-Escrow-Free Multi-Authority CP-ABE Scheme with Dual-Revocation. Search on Bibsonomy I. J. Network Security The full citation details ... 2018 DBLP  BibTeX  RDF
1Ranjit Kumar Upadhyay, Sangeeta Kumari Global Stability of Worm Propagation Model with Nonlinear Incidence Rate in Computer Network. Search on Bibsonomy I. J. Network Security The full citation details ... 2018 DBLP  BibTeX  RDF
1Rui Guo 0005, Huixian Shi An Efficient Confidentiality Preserving Scheme Using Certificateless Encryption with High Trust Level. Search on Bibsonomy I. J. Network Security The full citation details ... 2018 DBLP  BibTeX  RDF
1Rui-Hong Dong, Dong-Fang Wu, Qiu-Yu Zhang, Tao Zhang Traffic Characteristic Map-based Intrusion Detection Model for Industrial Internet. Search on Bibsonomy I. J. Network Security The full citation details ... 2018 DBLP  BibTeX  RDF
1Sujatha Sivabalan, Peter J. Radcliffe Feasibility of Eliminating IDPS Devices from a Web Server Farm. Search on Bibsonomy I. J. Network Security The full citation details ... 2018 DBLP  BibTeX  RDF
Displaying result #1 - #100 of 1116 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license