Showing results 12 to 19 of 19
< previous
Title | Author(s) | Issue Date | |
---|---|---|---|
2019 | |||
Photo forensics on shanzhai mobile phone Proceeding/Conference:Lecture Notes in Computer Science | 2013 | ||
Practical attribute-based encryption: Outsourcing decryption, attribute revocation and policy updating Journal:Journal of Network and Computer Applications | 2018 | ||
Protecting digital legal professional privilege LPP data Proceeding/Conference:Proceedings of the 3rd International Workshop on Systematic Approaches to Digital Forensic Engineering, SADFE 2008 | 2008 | ||
Secure chained threshold proxy signature without and with supervision Journal:Journal of Software Engineering and Applications | 2009 | ||
Secure Dot Product of Outsourced Encrypted Vectors and its Application to SVM Proceeding/Conference:Proceeding-SCC '17 Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing | 2017 | ||
Secure end-to-end browsing system with mobile composition Proceeding/Conference:International Conference on Internet Technology and Applications (iTAP) | 2011 | ||
SPECS: Secure and privacy enhancing communications schemes for VANETs Proceeding/Conference:Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering | 2010 |