MARP: A Distributed MAC Layer Attack Resistant Pseudonym Scheme for VANET | 0 | 0.34 | 2020 |
On Countermeasures of Pilot Spoofing Attack in Massive MIMO Systems: A Double Channel Training Based Approach | 2 | 0.37 | 2019 |
Collaborative Security in Vehicular Cloud Computing: A Game Theoretic View. | 2 | 0.37 | 2018 |
Efficient and Privacy-Preserving Ad Conversion for V2X-Assisted Proximity Marketing | 0 | 0.34 | 2018 |
Querying in Internet of Things with Privacy Preserving: Challenges, Solutions and Opportunities. | 7 | 0.41 | 2018 |
A Privacy-Preserving Thin-Client Scheme in Blockchain-Based PKI | 0 | 0.34 | 2018 |
Automated forensic analysis of mobile applications on Android devices. | 3 | 0.44 | 2018 |
Understanding Ethereum via Graph Analysis. | 12 | 0.54 | 2018 |
Security-Aware and Privacy-Preserving D2D Communications in 5G. | 6 | 0.44 | 2017 |
Privacy-Preserving Data Forwarding in VANETs: A Personal-Social Behavior Based Approach. | 0 | 0.34 | 2017 |
Silent Battery Draining Attack against Android Systems by Subverting Doze Mode. | 0 | 0.34 | 2016 |
Proxy Re-encryption with Delegatable Verifiability. | 0 | 0.34 | 2016 |
Cloud-Based Privacy-Preserving Parking Navigation Through Vehicular Communications. | 0 | 0.34 | 2016 |
SQLite Forensic Analysis Based on WAL. | 0 | 0.34 | 2016 |
CHetNet: crowdsourcing to heterogeneous cellular networks | 1 | 0.37 | 2015 |
Security and privacy in cloud-assisted wireless wearable communications: Challenges, solutions, and future directions | 23 | 0.73 | 2015 |
Networking for big data: part 2 [Guest Editorial] | 0 | 0.34 | 2015 |
An empirical investigation into path divergences for concolic execution using CREST | 2 | 0.35 | 2015 |
An ElGamal-based efficient and privacy-preserving data aggregation scheme for smart grid | 4 | 0.40 | 2014 |
PDP: A Privacy-Preserving Data Provenance Scheme | 2 | 0.39 | 2012 |