Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover Front Matter Privacy and Security Analysis
A Blind Signature Scheme Applying on Electronic Payment Scene Based on Quantum Secret Sharing Threshold Signature Scheme with Strong Forward Security Based on Chinese Remainder Theorem Lightweight Secure Cloud Auditing Scheme for Shared Data Supporting Identity Privacy and Traceability Research on Big Data Platform Security Based on Cloud Computing Database Query System with Budget Option for Differential Privacy Against Repeated Attacks Research on Social Networks Publishing Method Under Differential Privacy CROSS: Supervised Sharing of Private Data over Blockchains A Survey of Trusted Network Trust Evaluation Methods Anomaly Detection of Vehicle CAN Network Based on Message Content Android Malware Detection Based on Sensitive Permissions and APIs Security Assessment for Cascading Failures of Cyber-Physical Systems Under Target Attack Strategy Privacy Preservation in Publishing Electronic Health Records Based on Perturbation Privacy in Location-Based Services: Present Facts and Future Paths Privacy Disclosures Detection in Natural-Language Text Through Linguistically-Motivated Artificial Neural Networks Research on Information Security Test Evaluation Method Based on Intelligent Connected Vehicle Study on Incident Response System of Automotive Cybersecurity Secure Multi-keyword Fuzzy Search Supporting Logic Query over Encrypted Cloud Data A Practical Group Signatures for Providing Privacy-Preserving Authentication with Revocation An Efficient Privacy-Preserving Palmprint Authentication Scheme Based on ElGamal PJC: A Multi-source Method for Identifying Information Dissemination in Networks Steganalysis of Adaptive Multiple-Rate Speech Using Parity of Pitch-Delay Value Network Risk Assessment Based on Improved MulVAL Framework and HMM
Internet of Things and Cloud Computing
FIREWORK: Fog Orchestration for Secure IoT Networks An Effective Encryption Scheme on Outsourcing Data for Query on Cloud Platform Design of an Urban Waterlogging Monitoring System Based on Internet of Things A Multi-Objective Service Selection Method Based on Ant Colony Optimization for QoE Restrictions in the Internet of Things FDSCD: Fast Deletion Scheme of Cloud Data A RBAC Model Based on Identity-Based Cryptosystem in Cloud Storage Public Auditing of Log Integrity for Cloud Storage Systems via Blockchain Coordinated Web Scan Detection Based on Hierarchical Correlation Research on Multi Domain Based Access Control in Intelligent Connected Vehicle
System Building
Cryptanalysis of a Public Key Cryptosystem Based on Data Complexity Under Quantum Environment A Design of the Group Decision Making Medical Diagnosis Expert System Based on SED-JD Algorithm Design and Implementation of a Lightweight Intrusion Detection and Prevention System Reliability Analysis of Coupled Cyber-Physical Systems Under Different Network Types Invulnerability Assessment of Cyber-Physics Systems for Blockchain Environment Intrusion Detection System for IoT Heterogeneous Perceptual Network Based on Game Theory A Blockchain-Based Digital Advertising Media Promotion System Detecting Steganography in AMR Speech Based on Pulse Correlation State Consistency Checking for Non-reentrant Function Based on Taint Assisted Symbol Execution SE Dots: A Sensitive and Extensible Framework for Cross-Region DDoS Processing
Scheme, Model and Application for Data
A One-Way Variable Threshold Proxy Re-signature Scheme for Mobile Internet A New Signcryption Scheme Based on Elliptic Curves A Robust Reversible Watermarking Scheme for Relational Data BL-IDS: Detecting Web Attacks Using Bi-LSTM Model Based on Deep Learning An Static Propositional Function Model to Detect Software Vulnerability Design of ZigBee-Based Energy Harvesting Wireless Sensor Network and Modeling of Solar Energy Application of Big Data Technology in JD A Trusted International Settlement Solution Based on Cross Check of CDRs Fog-Enabled Smart Campus: Architecture and Challenges An Ant Colony Optimization Fuzzy Clustering Task Scheduling Algorithm in Mobile Edge Computing
Mechanism and Method in New Computing
A Posted Pricing Mechanism Based on Random Forests in Crowdsourcing Market A Reverse Auction Incentive Mechanism Based on the Participant’s Behavior in Crowdsensing A General Hardware Trojan Technique Targeted on Lightweight Cryptography with Bit-Serial Structure Identification and Trust Techniques Compatible with eIDAS Regulation Gathering Pattern Mining Method Based on Trajectory Data Stream Travel Modes Recognition Method Based on Mobile Phone Signaling Data Two-Level Feature Selection Method for Low Detection Rate Attacks in Intrusion Detection A Novel Wireless Sensor Networks Malicious Node Detection Method Grid Partition and Agglomeration for Bidirectional Hierarchical Clustering A Non-repudiable Dynamic Provable Data Possession Zone Based Lossy Image Compression Using Discrete Wavelet and Discrete Cosine Transformations
Back Matter
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion