Approximate Secrecy Capacity of Gaussian Parallel Relay Networks – PHD IN NS2
Understanding Information Hiding in iOS– PHD IN NS2
On the Secrecy Rate Region of Multiple-Access Wiretap Channel With Noncausal Side Information– PHD IN NS2
Face Spoof Detection With Image Distortion Analysis– PHD IN NS2
Distributed Detection in Tree Networks: Byzantines and Mitigation Techniques– PHD IN NS2
Twofold Video Hashing With Automatic Synchronization– PHD IN NS2
The CEO Problem With Secrecy Constraints– PHD IN NS2
Advanced Joint Bayesian Method for Face Verification– PHD IN NS2
Hill-Climbing Attacks on Multibiometrics Recognition Systems– PHD IN NS2
K-center: An Approach on the Multi-source Identification of Information Diffusion– PHD IN NS2
Cracking More Password Hashes With Patterns– PHD IN NS2
Novel Approach to Protect Advanced Encryption Standard Algorithm Implementation Against Differential Electromagnetic and Power Analysis– PHD IN NS2
Strong, Neutral, or Weak: Exploring the Impostor Score Distribution– PHD IN NS2
StirTraceV2.0: Enhanced Benchmarking and Tuning of Printed Fingerprint Detection– PHD IN NS2
One-Time Spectrum Coexistence in Dynamic Spectrum Access When the Secondary User May Be Malicious– PHD IN NS2
Security-Aware Max–Min Resource Allocation in Multiuser OFDMA Downlink– PHD IN NS2
Anonymous multi-receiver remote data retrieval for pay-TV in public clouds– PHD IN NS2
An Approach to Predict Drive-by-Download Attacks by Vulnerability Evaluation and Opcode– PHD IN NS2
Privacy-Preserving Epidemiological Analysis for a Distributed Database of Hospitals– PHD IN NS2
Dynamic and verifiable multi-secret sharing scheme based on Hermite interpolation and bilinear maps– PHD IN NS2
Parallel key management scheme for mobile ad hoc network based on traffic mining– PHD IN NS2
Tap-Wave-Rub: Lightweight Human Interaction Approach to Curb Emerging Smartphone Malware– PHD IN NS2
Asymptotics of Fingerprinting and Group Testing: Tight Bounds From Channel Capacities– PHD IN NS2
Preliminary Design of a Novel Lightweight Authenticated Encryption Scheme Based on the Sponge Function– PHD IN NS2
Physical Layer Spectrum Usage Authentication In Cognitive Radio: Analysis and Implementation– PHD IN NS2