CORC

浏览/检索结果: 共6条,第1-6条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
A Security Design for the Detecting of Buffer Overflow Attacks in IoT Device 期刊论文
IEEE ACCESS, 2018, 卷号: 6, 页码: 72862-72869
作者:  Xu, Bin;  Wang, Weike;  Hao, Qiang;  Zhang, Zhun;  Du, Pei
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/30
Secure and Efficient Cloud Data Deduplication With Randomized Tag 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 卷号: 12, 页码: 532-543
作者:  Jiang, Tao;  Chen, Xiaofeng;  Wu, Qianhong;  Ma, Jianfeng;  Susilo, Willy
收藏  |  浏览/下载:9/0  |  提交时间:2019/12/30
Keep all mobile users' whereabouts secure: a radio frequency identification protocol anti-tracking in 5G 期刊论文
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2016, 卷号: 29, 期号: 16, 页码: 2375-2387
作者:  Yin, Xi;  Fang, Binxing;  Jin, Shuyuan;  Qiu, Meikang;  Vasilakos, Athanasios V.
收藏  |  浏览/下载:16/0  |  提交时间:2019/12/12
A multi-tag secure network coding scheme against pollution attacks in WSNs 期刊论文
Journal of Computational Information Systems, 2015, 卷号: Vol.11 No.12, 页码: 4413-4420
作者:  Zhang, Dafang;  Li, Youpeng;  Ning, Zuoting
收藏  |  浏览/下载:1/0  |  提交时间:2019/12/31
Secure tag search in RFID systems using mobile readers 期刊论文
IEEE Transactions on Dependable and Secure Computing, 2015, 卷号: 12, 期号: 2, 页码: 230-242
作者:  Sundaresan, Saravanan*;  Doss, Robin;  Piramuthu, Selwyn;  Zhou, Wanlei
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/27
on the security of encrypt-and-mac paradigm 期刊论文
Chinese Journal of Electronics, 2007, 卷号: 16, 期号: 1, 页码: 45-50
Hu Zhenyu; Lin Dongdai; Wu Wenling; Feng Dengguo
收藏  |  浏览/下载:14/0  |  提交时间:2010/08/19


©版权所有 ©2017 CSpace - Powered by CSpace