Performance Gains From Cooperative MIMO Radar and MIMO Communication Systems. | 5 | 0.43 | 2019 |
Modeling Context-aware Legal Computing with Bigraphs. | 0 | 0.34 | 2017 |
Generalized Cramér–Rao Bound for Joint Estimation of Target Position and Velocity for Active and Passive Radar Networks | 10 | 0.51 | 2016 |
Comparing the Cramer-Rao bounds for distributed radar with and without previous detection information | 0 | 0.34 | 2015 |
Edges Protection In Multiple Releases Of Social Network Data | 0 | 0.34 | 2014 |
Security Flaw of an ECC-based Signcryption Scheme with Anonymity. | 1 | 0.36 | 2013 |
MisDis: An Efficent Misbehavior Discovering Method Based on Accountability and State Machine in VANET. | 0 | 0.34 | 2013 |
Sensitive edges protection in social networks | 0 | 0.34 | 2013 |
Context-Aware Service Modeling and Rule Evolution | 0 | 0.34 | 2013 |
Resisting relay attacks on vehicular Passive Keyless Entry and start systems. | 2 | 0.38 | 2012 |
Efficient Detect Scheme of Botnet Command and Control Communication. | 0 | 0.34 | 2012 |
PKU-STRAW-L: A Simulative Platform Evaluate the Power-Saving Rate of the Intelligent Street Lamp System | 0 | 0.34 | 2012 |
iSac: Intimacy Based Access Control for Social Network Sites | 3 | 0.39 | 2012 |
Privacy protection in social networks using l-diversity | 0 | 0.34 | 2012 |
Real-Valued negative selection algorithm with variable-sized self radius | 2 | 0.37 | 2012 |
RGH: An Efficient RSU-Aided Group-Based Hierarchical Privacy Enhancement Protocol for VANETs. | 0 | 0.34 | 2012 |
Further Improvement of An Authentication Scheme with User Anonymity for Wireless Communications. | 4 | 0.40 | 2012 |
A novel commutative blinding identity based encryption scheme | 0 | 0.34 | 2011 |
New fully secure hierarchical identity-based encryption with constant size ciphertexts | 2 | 0.38 | 2011 |
Produre: A novel proximity discovery mechanism in location tagging system | 0 | 0.34 | 2011 |
On the security of an identity based multi-proxy signature scheme | 12 | 0.53 | 2011 |
A traceable privacy-preserving authentication protocol for VANETs based on proxy re-signature. | 1 | 0.36 | 2011 |
Sitab: Combating Spam in Tagging Systems via Users' Implicit Tagging Behavior | 0 | 0.34 | 2011 |
A traceable certificateless threshold proxy signature scheme from bilinear pairings | 0 | 0.34 | 2011 |
Need for Symmetry: Addressing Privacy Risks in Online Social Networks | 1 | 0.39 | 2011 |
When ABE Meets RSS | 0 | 0.34 | 2010 |
Data-Centric trust framework for high integrity wireless sensor networks | 0 | 0.34 | 2010 |
An Adjacency Matrixes-Based Model for Network Security Analysis | 1 | 0.39 | 2010 |
Towards Risk Evaluation of Denial-of-Service Vulnerabilities in Security Protocols. | 1 | 0.35 | 2010 |
Identity-based encryption based on DHIES | 3 | 0.41 | 2010 |
Implementing Attribute-Based Encryption in Web Services | 2 | 0.39 | 2010 |
Efficient privacy-preserving authentication protocol for vehicular communications with trustworthy | 2 | 0.39 | 2010 |
New construction of identity-based proxy re-encryption | 3 | 0.38 | 2010 |
Ciphertext policy attribute-based proxy re-encryption | 37 | 0.97 | 2010 |
SWORDS: improving sensor networks immunity under worm attacks | 1 | 0.37 | 2010 |
Filtering false data via authentic consensus in vehicle ad hoc networks | 2 | 0.40 | 2010 |
Claper: Recommend classical papers to beginners | 8 | 0.54 | 2010 |
DSpam: Defending Against Spam in Tagging Systems via Users' Reliability | 3 | 0.45 | 2010 |
A Secure Routing Protocol and its application in Multi-sink Wireless Sensor Networks. | 2 | 0.36 | 2010 |
Securing key issuing in peer-to-peer networks | 0 | 0.34 | 2009 |
Evaluating Network Security With Two-Layer Attack Graphs | 15 | 0.74 | 2009 |
Automatic Data Extraction from Web Discussion Forums | 3 | 0.46 | 2009 |
A New Method to Generate Attack Graphs | 0 | 0.34 | 2009 |
SKIP: A Secure Key Issuing Scheme for Peer-to-Peer Networks | 2 | 0.37 | 2009 |
A holistic mechanism against file pollution in peer-to-peer networks | 8 | 0.47 | 2009 |
Scalable Byzantine Fault Tolerant Public Key Authentication for Peer-to-Peer Networks | 6 | 0.50 | 2008 |
Fbsr: Feedback-Based Secure Routing Protocol For Wireless Sensor Networks | 3 | 0.41 | 2008 |
Automatic Construction and Optimization of Layered Network Attack Graph. | 0 | 0.34 | 2008 |
Hybrid Overlay Structure Based on Virtual Node | 1 | 0.43 | 2007 |
CuboidTrust: a global reputation-based trust model in peer-to-peer networks | 14 | 0.67 | 2007 |