Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover
Front Matter
Privacy and Security Analysis
A Blind Signature Scheme Applying on Electronic Payment Scene Based on Quantum Secret Sharing
Threshold Signature Scheme with Strong Forward Security Based on Chinese Remainder Theorem
Lightweight Secure Cloud Auditing Scheme for Shared Data Supporting Identity Privacy and Traceability
Research on Big Data Platform Security Based on Cloud Computing
Database Query System with Budget Option for Differential Privacy Against Repeated Attacks
Research on Social Networks Publishing Method Under Differential Privacy
CROSS: Supervised Sharing of Private Data over Blockchains
A Survey of Trusted Network Trust Evaluation Methods
Anomaly Detection of Vehicle CAN Network Based on Message Content
Android Malware Detection Based on Sensitive Permissions and APIs
Security Assessment for Cascading Failures of Cyber-Physical Systems Under Target Attack Strategy
Privacy Preservation in Publishing Electronic Health Records Based on Perturbation
Privacy in Location-Based Services: Present Facts and Future Paths
Privacy Disclosures Detection in Natural-Language Text Through Linguistically-Motivated Artificial Neural Networks
Research on Information Security Test Evaluation Method Based on Intelligent Connected Vehicle
Study on Incident Response System of Automotive Cybersecurity
Secure Multi-keyword Fuzzy Search Supporting Logic Query over Encrypted Cloud Data
A Practical Group Signatures for Providing Privacy-Preserving Authentication with Revocation
An Efficient Privacy-Preserving Palmprint Authentication Scheme Based on ElGamal
PJC: A Multi-source Method for Identifying Information Dissemination in Networks
Steganalysis of Adaptive Multiple-Rate Speech Using Parity of Pitch-Delay Value
Network Risk Assessment Based on Improved MulVAL Framework and HMM
Internet of Things and Cloud Computing
FIREWORK: Fog Orchestration for Secure IoT Networks
An Effective Encryption Scheme on Outsourcing Data for Query on Cloud Platform
Design of an Urban Waterlogging Monitoring System Based on Internet of Things
A Multi-Objective Service Selection Method Based on Ant Colony Optimization for QoE Restrictions in the Internet of Things
FDSCD: Fast Deletion Scheme of Cloud Data
A RBAC Model Based on Identity-Based Cryptosystem in Cloud Storage
Public Auditing of Log Integrity for Cloud Storage Systems via Blockchain
Coordinated Web Scan Detection Based on Hierarchical Correlation
Research on Multi Domain Based Access Control in Intelligent Connected Vehicle
System Building
Cryptanalysis of a Public Key Cryptosystem Based on Data Complexity Under Quantum Environment
A Design of the Group Decision Making Medical Diagnosis Expert System Based on SED-JD Algorithm
Design and Implementation of a Lightweight Intrusion Detection and Prevention System
Reliability Analysis of Coupled Cyber-Physical Systems Under Different Network Types
Invulnerability Assessment of Cyber-Physics Systems for Blockchain Environment
Intrusion Detection System for IoT Heterogeneous Perceptual Network Based on Game Theory
A Blockchain-Based Digital Advertising Media Promotion System
Detecting Steganography in AMR Speech Based on Pulse Correlation
State Consistency Checking for Non-reentrant Function Based on Taint Assisted Symbol Execution
SE Dots: A Sensitive and Extensible Framework for Cross-Region DDoS Processing
Scheme, Model and Application for Data
A One-Way Variable Threshold Proxy Re-signature Scheme for Mobile Internet
A New Signcryption Scheme Based on Elliptic Curves
A Robust Reversible Watermarking Scheme for Relational Data
BL-IDS: Detecting Web Attacks Using Bi-LSTM Model Based on Deep Learning
An Static Propositional Function Model to Detect Software Vulnerability
Design of ZigBee-Based Energy Harvesting Wireless Sensor Network and Modeling of Solar Energy
Application of Big Data Technology in JD
A Trusted International Settlement Solution Based on Cross Check of CDRs
Fog-Enabled Smart Campus: Architecture and Challenges
An Ant Colony Optimization Fuzzy Clustering Task Scheduling Algorithm in Mobile Edge Computing
Mechanism and Method in New Computing
A Posted Pricing Mechanism Based on Random Forests in Crowdsourcing Market
A Reverse Auction Incentive Mechanism Based on the Participant’s Behavior in Crowdsensing
A General Hardware Trojan Technique Targeted on Lightweight Cryptography with Bit-Serial Structure
Identification and Trust Techniques Compatible with eIDAS Regulation
Gathering Pattern Mining Method Based on Trajectory Data Stream
Travel Modes Recognition Method Based on Mobile Phone Signaling Data
Two-Level Feature Selection Method for Low Detection Rate Attacks in Intrusion Detection
A Novel Wireless Sensor Networks Malicious Node Detection Method
Grid Partition and Agglomeration for Bidirectional Hierarchical Clustering
A Non-repudiable Dynamic Provable Data Possession
Zone Based Lossy Image Compression Using Discrete Wavelet and Discrete Cosine Transformations
Back Matter
← Prev
Back
Next →
← Prev
Back
Next →