Hierarchical and Dynamic Elliptic Curve Cryptosystem Based Self-Certified Public Key Scheme for Medical Data Protection – NETWORK SECURITY PROJECTS |
Filtering spam in Weibo using ensemble imbalanced classification and knowledge expansion– NETWORK SECURITY PROJECTS |
DaSCE: Data Security for Cloud Environment with Semi-Trusted Third Party– NETWORK SECURITY PROJECTS |
The design of a secure SIP-based architecture for broadband service providers– NETWORK SECURITY PROJECTS |
Multipartite monotones for secure sampling by public discussion from noisy correlations– NETWORK SECURITY PROJECTS |
Secure Outsourcing of Multiple Modular Exponentiations– NETWORK SECURITY PROJECTS |
Applying human computer interaction to individual security using mobile application– NETWORK SECURITY PROJECTS |
Secure Beamforming for SWIPT in Multiuser MISO Broadcast Channel With Confidential Messages– NETWORK SECURITY PROJECTS |
Behavior based authentication mechanism to prevent malicious code attacks in windows– NETWORK SECURITY PROJECTS |
Linking virtual and real-world identities– NETWORK SECURITY PROJECTS |
Private and Secure Tag Access for Large-Scale RFID Systems– NETWORK SECURITY PROJECTS |
Analysis on end-to-end node selection probability in Tor network– NETWORK SECURITY PROJECTS |
Violation of user privacy by IPTV packet sniffing in home network– NETWORK SECURITY PROJECTS |
Towards building a word similarity dictionary for personality bias classification of phishing email contents– NETWORK SECURITY PROJECTS |
SteganoPIN: Two-Faced Human–Machine Interface for Practical Enforcement of PIN Entry Security– NETWORK SECURITY PROJECTS |
Diverse Grouping-Based Aggregation Protocol With Error Detection for Smart Grid Communications– NETWORK SECURITY PROJECTS |
Constructive Multiuser Interference in Symbol Level Precoding for the MISO Downlink Channel– NETWORK SECURITY PROJECTS |
Big data for C4i systems: goals, applications, challenges and tools– NETWORK SECURITY PROJECTS |
Operating system impact on CPU and RAM utilisation when introducing XML security– NETWORK SECURITY PROJECTS |
Secure Robust Ergodic Uplink Resource Allocation in Relay-Assisted Cognitive Radio Networks– NETWORK SECURITY PROJECTS |
A kernel based Atanassov’s intuitionistic fuzzy clustering for network forensics and intrusion detection– NETWORK SECURITY PROJECTS |
The Research of Security of P2P Network File Sharing System– NETWORK SECURITY PROJECTS |
Partial discharge recognition in gas insulated switchgear based on multi-information fusion– NETWORK SECURITY PROJECTS |
Tattoo recognition technology – challenge (Tatt-C): an open tattoo database for developing tattoo recognition research– NETWORK SECURITY PROJECTS |
Copy-move detection of audio recording with pitch similarity– NETWORK SECURITY PROJECTS |
2015 IEEE NETWORK SECURITY PROJECTS |