Search

Your search keyword '"Guilin Wang"' showing total 20 results

Search Constraints

Start Over You searched for: Author "Guilin Wang" Remove constraint Author: "Guilin Wang" Journal information & communications security (978-3-540-77047-3) Remove constraint Journal: information & communications security (978-3-540-77047-3)
20 results on '"Guilin Wang"'

Search Results

1. Firewall for Dynamic IP Address in Mobile IPv6.

2. DDoS Attack Detection Algorithms Based on Entropy Computing.

3. Collecting Autonomous Spreading Malware Using High-Interaction Honeypots.

4. Detection and Diagnosis of Control Interception.

5. A Novel Approach for Untrusted Code Execution.

6. Power Efficient Hardware Architecture of SHA-1 Algorithm for Trusted Mobile Computing.

7. BIOS Security Analysis and a Kind of Trusted BIOS.

8. What Semantic Equivalences Are Suitable for Non-interference Properties in Computer Security.

9. Attacking Reduced-Round Versions of the SMS4 Block Cipher in the Chinese WAPI Standard.

10. On the Design of Fast Prefix-Preserving IP Address Anonymization Scheme.

11. Differential Fault Analysis on CLEFIA.

12. Audio Watermarking Algorithm Based on Centroid and Statistical Features.

13. Boudot's Range-Bounded Commitment Scheme Revisited.

14. Square Like Attack on Camellia.

15. Secure Multiparty Computation of DNF.

16. A Semi-blind Watermarking Based on Discrete Wavelet Transform.

17. MDH: A High Speed Multi-phase Dynamic Hash String Matching Algorithm for Large-Scale Pattern Set.

18. Privacy Protection on Multiple Sensitive Attributes.

19. Preventing Unofficial Information Propagation.

20. Short Group Signature Without Random Oracles.

Catalog

Books, media, physical & digital resources