Discovery - Top 10

Journal/Proceeding/Conference

Language

Search

Current filters:
Start a new search
Add filters:

Use filters to refine the search results.

Results 1-25 of 331 (Search time: 0.031 seconds).

TitleAuthor(s)Issue DateViews
 
2017
63
 
2019
40
 
An efficient scheme for hard disk integrity check in digital forensics by hashing with combinatorial group testing
Journal:International Journal of Digital Content Technology and its Applications
2011
296
Role activation management in role based access control
Proceeding/Conference:Lecture Notes in Computer Science
2005
101
 
An Efficient Alignment Algorithm for Searching Simple Pseudoknots over Long Genomic Sequence
Journal:IEEE/ACM Transactions on Computational Biology and Bioinformatics
2012
32
 
Providing distributed certificate authority service in mobile ad hoc networks
Proceeding/Conference:Proceedings - First International Conference on Security and Privacy for Emerging Areas in Communications Networks, SecureComm 2005
2005
193
 
2008
110
 
2012
151
 
Delegation with supervision
Journal:Information Sciences
2007
129
Related randomness attacks for public key crypto systems
Proceeding/Conference:ASIACCS 2015 - Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security
2015
51
Chained threshold proxy signature without and with supervision
Proceeding/Conference:Proceedings - International Conference on Computer Science and Software Engineering, CSSE 2008
2008
115
 
2007
188
A key-recovery system for long-term encrypted documents
Proceeding/Conference:Proceedings - 2006 10th IEEE International Enterprise Distributed Object Computing Conference Workshops, EDOCW2006
2006
123
Secure role activation and authorization in the enterprise environment
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2005
112
 
2012
47
 
2005
113
 
Finding Linear Motif Pair from Protein Interaction Networks: A Probabilistic Approach
Proceeding/Conference:The 6th Annual International Conference on Computational Systems Bioinformatics Conference (CSB 2007)
2007
77
 
Forward-secure multisignature and blind signature schemes
Journal:Applied Mathematics and Computation
2005
384
 
Automatic Construction of Online Catalog Topologies Using Decision Trees
Proceeding/Conference:2nd International Conference on Electronic Commerce and Web Technologies (EC-Web 2001)
2001
84
 
High throughput short read alignment via bi-directional BWT
Proceeding/Conference:Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2009
2009
180
Two improved partially blind signature schemes from bilinear pairings
Proceeding/Conference:Lecture Notes in Computer Science
2005
100
Adaptive phenotype testing for AND/OR items
Proceeding/Conference:Lecture Notes In Computer Science
2011
110
A Forensic Logging System for Siemens Programmable Logic Controllers
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2018
65
 
Secure Query Processing with Data Interoperability in a Cloud Database Environment
Proceeding/Conference:Proceedings of the 2014 ACM SIGMOD International Conference on Management of Data
2014
61
Towards a better similarity measure for keyword profiling via clustering
Proceeding/Conference:IEEE International Computer Software and Applications Conference Proceedings
2013
41