32 results on '"Dong, Qingkuan"'
Search Results
2. Natural sd-RCCA Secure Public-Key Encryptions
3. DNS-BC: Fast, Reliable and Secure Domain Name System Caching System Based on a Consortium Blockchain
4. Trust based routing mechanism for securing OSLR-based MANET
5. RCCA Security for KEM+DEM Style Hybrid Encryptions
6. Hitting Moving Targets: Intelligent Prevention of IoT Intrusions on the Fly
7. Sneaking Through Security: Mutating Live Network Traffic to Evade Learning-Based NIDS
8. A New Publicly Verifiable Proxy Signcryption Scheme
9. Natural sd-RCCA Secure Public-Key Encryptions
10. Two extensions of the ring signature scheme of Rivest–Shamir–Taumann
11. Two types of new subliminal channels
12. RCCA Security for KEM+DEM Style Hybrid Encryptions
13. Event-triggered state estimator design for unknown input and noise-correlated random system
14. Energy-Efficient Neighbor Discovery for the Internet of Things
15. Cloud-based radio frequency identification authentication protocol with location privacy protection
16. RCCA security for KEM+DEM style hybrid encryptions and a general hybrid paradigm from RCCA-secure KEMs to CCA-secure encryptions
17. Priority based Dynamic Load Balancing for Multi-Homed Network Mobility
18. Cloud-based radio frequency identification authentication protocol with location privacy protection
19. Cloud-Based RFID Mutual Authentication Protocol without Leaking Location Privacy to the Cloud
20. A similarity-based indirect trust model with anti-spoofing capability
21. A Trust Management System for Securing Data Plane of Ad-Hoc Networks
22. TrustR: An Integrated Router Security Framework for Protecting Computer Networks
23. Achieving CCA security from DCCA security more efficiently by using the KEM+DEM hybrid paradigm
24. ECC-based RFID/NFC Mutual Authentication Protocol
25. A New Publicly Verifiable Proxy Signcryption Scheme
26. An Efficient Trusted Mobile Router Selection Mechanism for Multihomed NEMO Network
27. Improvement and optimized implementation of cryptoGPS protocol for low-cost radio-frequency identification authentication
28. A SHA-3 based RFID mutual authentication protocol and its implementation
29. A Subliminal-Free Variant of ECDSA Using Interactive Protocol
30. A new client-puzzle based DoS-resistant scheme of IEEE 802.11i wireless authentication protocol
31. A Security Registration Based on IPSec for Mobile IPv6 Fast Handoff
32. Improvement and optimized implementation of cryptoGPS protocol for low-cost radio-frequency identification authentication.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.