no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
An adaptive push-styled command and control mechanism in mobile botnets
|
Chen, Wei |
|
2013 |
18 |
5 |
p. 427-434 |
article |
2 |
An anonymous data collection framework for digital community
|
Li, Hongtao |
|
2013 |
18 |
5 |
p. 385-392 |
article |
3 |
A novel fuzzy keyword retrieval scheme over encrypted cloud data
|
Tian, Ke |
|
2013 |
18 |
5 |
p. 393-401 |
article |
4 |
A novel secret sharing scheme based on minimal linear codes
|
Li, Zhihui |
|
2013 |
18 |
5 |
p. 407-412 |
article |
5 |
An unknown Trojan detection method based on software network behavior
|
Liang, Yu |
|
2013 |
18 |
5 |
p. 369-376 |
article |
6 |
Application of improved PSO-LSSVM on network threat detection
|
Qi, Fumin |
|
2013 |
18 |
5 |
p. 418-426 |
article |
7 |
A privacy protection method for continuous query based on location services
|
Hu, Wenling |
|
2013 |
18 |
5 |
p. 449-454 |
article |
8 |
A quantum error-correction circuit based on cyclic code
|
Lü, Hongjun |
|
2013 |
18 |
5 |
p. 413-417 |
article |
9 |
Formulations of some bit switching functions in DES
|
You, Lin |
|
2013 |
18 |
5 |
p. 402-406 |
article |
10 |
G bytes data hiding method based on cluster chain structure
|
Niu, Xiaopeng |
|
2013 |
18 |
5 |
p. 443-448 |
article |
11 |
Homomorphic MAC-based scheme against pollution attacks in network coding
|
Zhang, Yujie |
|
2013 |
18 |
5 |
p. 435-442 |
article |
12 |
Information transfer model of virtual machine based on storage covert channel
|
Wang, Xiaorui |
|
2013 |
18 |
5 |
p. 377-384 |
article |
13 |
Reversible audio watermarking algorithm using non-causal prediction
|
Huo, Yongjin |
|
2013 |
18 |
5 |
p. 455-460 |
article |