NETWORK SECURITY PROJECTS


NETWORK SECURITY PROJECTS
Hierarchical and Dynamic Elliptic Curve Cryptosystem Based Self-Certified Public Key Scheme for Medical Data Protection – NETWORK SECURITY PROJECTS
Filtering spam in Weibo using ensemble imbalanced classification and knowledge expansion– NETWORK SECURITY PROJECTS
DaSCE: Data Security for Cloud Environment with Semi-Trusted Third Party– NETWORK SECURITY PROJECTS
The design of a secure SIP-based architecture for broadband service providers– NETWORK SECURITY PROJECTS
Multipartite monotones for secure sampling by public discussion from noisy correlations– NETWORK SECURITY PROJECTS
Secure Outsourcing of Multiple Modular Exponentiations– NETWORK SECURITY PROJECTS
Applying human computer interaction to individual security using mobile application– NETWORK SECURITY PROJECTS
Secure Beamforming for SWIPT in Multiuser MISO Broadcast Channel With Confidential Messages– NETWORK SECURITY PROJECTS
Behavior based authentication mechanism to prevent malicious code attacks in windows– NETWORK SECURITY PROJECTS
Linking virtual and real-world identities– NETWORK SECURITY PROJECTS
Private and Secure Tag Access for Large-Scale RFID Systems– NETWORK SECURITY PROJECTS
Analysis on end-to-end node selection probability in Tor network– NETWORK SECURITY PROJECTS
Violation of user privacy by IPTV packet sniffing in home network– NETWORK SECURITY PROJECTS
Towards building a word similarity dictionary for personality bias classification of phishing email contents– NETWORK SECURITY PROJECTS
SteganoPIN: Two-Faced Human–Machine Interface for Practical Enforcement of PIN Entry Security– NETWORK SECURITY PROJECTS
Diverse Grouping-Based Aggregation Protocol With Error Detection for Smart Grid Communications– NETWORK SECURITY PROJECTS
Constructive Multiuser Interference in Symbol Level Precoding for the MISO Downlink Channel– NETWORK SECURITY PROJECTS
Big data for C4i systems: goals, applications, challenges and tools– NETWORK SECURITY PROJECTS
Operating system impact on CPU and RAM utilisation when introducing XML security– NETWORK SECURITY PROJECTS
Secure Robust Ergodic Uplink Resource Allocation in Relay-Assisted Cognitive Radio Networks– NETWORK SECURITY PROJECTS
A kernel based Atanassov’s intuitionistic fuzzy clustering for network forensics and intrusion detection– NETWORK SECURITY PROJECTS
The Research of Security of P2P Network File Sharing System– NETWORK SECURITY PROJECTS
Partial discharge recognition in gas insulated switchgear based on multi-information fusion– NETWORK SECURITY PROJECTS
Tattoo recognition technology – challenge (Tatt-C): an open tattoo database for developing tattoo recognition research– NETWORK SECURITY PROJECTS
Copy-move detection of audio recording with pitch similarity– NETWORK SECURITY PROJECTS
2015 IEEE NETWORK SECURITY PROJECTS