Browsing by Author Jiang, ZL

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 1 to 19 of 19
TitleAuthor(s)Issue DateViews
 
2012
146
 
2011
148
A dual cube hashing scheme for solving LPP integrity problem
Proceeding/Conference:IEEE Symposium on Security and Privacy Proceedings
2011
187
 
Efficient key integrity verification for quantum cryptography using combinatorial group testing
Proceeding/Conference:Proceedings of SPIE - The International Society for Optical Engineering
2010
599
 
An efficient scheme for hard disk integrity check in digital forensics by hashing with combinatorial group testing
Journal:International Journal of Digital Content Technology and its Applications
2011
330
 
Forensic analysis of pirated Chinese Shanzhai mobile phones
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2012
147
 
Hard disk integrity check by hashing with combinatorial group testing
Proceeding/Conference:Proceedings of the International Conference on Computer Science and Its Applications, CSA 2009
2009
160
Improving disk sector integrity using 3-dimension hashing scheme
Proceeding/Conference:International Conference on Future Generation Communication and Networking (FGCN 2007) Proceedings
2007
117
 
2011
183
A key-recovery system for long-term encrypted documents
Proceeding/Conference:Proceedings - 2006 10th IEEE International Enterprise Distributed Object Computing Conference Workshops, EDOCW2006
2006
122
 
Maintaining hard disk integrity with digital legal professional privilege (LPP) data
Journal:IEEE Transactions on Information Forensics and Security
2013
109
 
2019
53
 
Photo forensics on shanzhai mobile phone
Proceeding/Conference:Lecture Notes in Computer Science
2013
173
 
2018
104
 
Protecting digital legal professional privilege LPP data
Proceeding/Conference:Proceedings of the 3rd International Workshop on Systematic Approaches to Digital Forensic Engineering, SADFE 2008
2008
216
 
Secure chained threshold proxy signature without and with supervision
Journal:Journal of Software Engineering and Applications
2009
591
 
Secure Dot Product of Outsourced Encrypted Vectors and its Application to SVM
Proceeding/Conference:Proceeding-SCC '17 Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing
2017
143
Secure end-to-end browsing system with mobile composition
Proceeding/Conference:International Conference on Internet Technology and Applications (iTAP)
2011
138
SPECS: Secure and privacy enhancing communications schemes for VANETs
Proceeding/Conference:Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering
2010
116