Approximate Secrecy Capacity of Gaussian Parallel Relay Networks – PHD IN NS2 |
Understanding Information Hiding in iOS– PHD IN NS2 |
On the Secrecy Rate Region of Multiple-Access Wiretap Channel With Noncausal Side Information– PHD IN NS2 |
Face Spoof Detection With Image Distortion Analysis– PHD IN NS2 |
Distributed Detection in Tree Networks: Byzantines and Mitigation Techniques– PHD IN NS2 |
Twofold Video Hashing With Automatic Synchronization– PHD IN NS2 |
The CEO Problem With Secrecy Constraints– PHD IN NS2 |
Advanced Joint Bayesian Method for Face Verification– PHD IN NS2 |
Hill-Climbing Attacks on Multibiometrics Recognition Systems– PHD IN NS2 |
K-center: An Approach on the Multi-source Identification of Information Diffusion– PHD IN NS2 |
Cracking More Password Hashes With Patterns– PHD IN NS2 |
Novel Approach to Protect Advanced Encryption Standard Algorithm Implementation Against Differential Electromagnetic and Power Analysis– PHD IN NS2 |
Strong, Neutral, or Weak: Exploring the Impostor Score Distribution– PHD IN NS2 |
StirTraceV2.0: Enhanced Benchmarking and Tuning of Printed Fingerprint Detection– PHD IN NS2 |
One-Time Spectrum Coexistence in Dynamic Spectrum Access When the Secondary User May Be Malicious– PHD IN NS2 |
Security-Aware Max–Min Resource Allocation in Multiuser OFDMA Downlink– PHD IN NS2 |
Anonymous multi-receiver remote data retrieval for pay-TV in public clouds– PHD IN NS2 |
An Approach to Predict Drive-by-Download Attacks by Vulnerability Evaluation and Opcode– PHD IN NS2 |
Privacy-Preserving Epidemiological Analysis for a Distributed Database of Hospitals– PHD IN NS2 |
Dynamic and verifiable multi-secret sharing scheme based on Hermite interpolation and bilinear maps– PHD IN NS2 |
Parallel key management scheme for mobile ad hoc network based on traffic mining– PHD IN NS2 |
Tap-Wave-Rub: Lightweight Human Interaction Approach to Curb Emerging Smartphone Malware– PHD IN NS2 |
Asymptotics of Fingerprinting and Group Testing: Tight Bounds From Channel Capacities– PHD IN NS2 |
Preliminary Design of a Novel Lightweight Authenticated Encryption Scheme Based on the Sponge Function– PHD IN NS2 |
Physical Layer Spectrum Usage Authentication In Cognitive Radio: Analysis and Implementation– PHD IN NS2 |
2015 IEEE PHD IN NS2 |