Pascal and Francis Bibliographic Databases

Help

Search results

Your search

cc.\*:("001D04A04E")

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 7334

  • Page / 294
Export

Selection :

  • and

Locality Regularization Embedding for face verificationYING HAN PANG; ANDREW BENG JIN TEOH; FU SAN HIEW et al.Pattern recognition. 2015, Vol 48, Num 1, pp 86-102, issn 0031-3203, 17 p.Article

Secure biometric template generation for multi-factor authenticationKHAN, Salman H; ALI AKBAR, M; SHAHZAD, Farrukh et al.Pattern recognition. 2015, Vol 48, Num 2, pp 458-472, issn 0031-3203, 15 p.Article

A Hybrid Scheme for Authenticating Scalable Video CodestreamsZHUO WEI; YONGDONG WU; DENG, Robert H et al.IEEE transactions on information forensics and security. 2014, Vol 9, Num 3-4, pp 543-553, issn 1556-6013, 11 p.Article

A Key Hiding Communication Scheme for Enhancing the Wireless LAN SecuritySINGH, Rajeev; TEEK PARVAL SHARMA.Wireless personal communications. 2014, Vol 77, Num 2, pp 1145-1165, issn 0929-6212, 21 p.Article

A Robust Grouping Proof Protocol for RFID EPC CIG2 TagsSUNDARESAN, Saravanan; DOSS, Robin; PIRAMUTHU, Selwyn et al.IEEE transactions on information forensics and security. 2014, Vol 9, Num 5-6, pp 961-975, issn 1556-6013, 15 p.Article

A Secure Information Transmission Scheme With a Secret Key Based on Polar CodingKIM, Young-Sik; KIM, Jong-Hwan; KIM, Sang-Hyo et al.IEEE communications letters. 2014, Vol 18, Num 6, pp 937-940, issn 1089-7798, 4 p.Article

A Strong Designated Verifier Ring Signcryption Scheme Providing Strongest Signers' AnonymityHWANG, Shin-Jia; CHEN, Jyong-Ye.Journal of information science and engineering. 2014, Vol 30, Num 3, pp 895-910, issn 1016-2364, 16 p.Article

A content security protection scheme in JPEG compressed domainYANYAN XU; LIZHI XIONG; ZHENGQUAN XU et al.Journal of visual communication and image representation (Print). 2014, Vol 25, Num 5, pp 805-813, issn 1047-3203, 9 p.Article

A fingerprint-based audio authentication scheme using frequency domain statistical characteristicFAN, Ming-Quan; WANG, Hong-Xia; LI, Heng-Jian et al.Multimedia tools and applications. 2014, Vol 70, Num 3, pp 2255-2270, issn 1380-7501, 16 p.Article

A formalization of card-based cryptographic protocols via abstract machineMIZUKI, Takaaki; SHIZUYA, Hiroki.International journal of information security (Print). 2014, Vol 13, Num 1, pp 15-23, issn 1615-5262, 9 p.Article

A practical solution for sealed bid and multi-currency auctionsMONTENEGRO, Jose A; LOPEZ, Javier.Computers & security. 2014, Vol 45, pp 186-198, issn 0167-4048, 13 p.Article

A probabilistic framework for jammer identification in MANETsALBANESE, Massimiliano; DE BENEDICTIS, Alessandra; JAJODIA, Sushil et al.Ad hoc networks. 2014, Vol 14, pp 84-94, issn 1570-8705, 11 p.Article

A robust watermarking scheme exploiting balanced neural tree for rightful ownership protectionRANI, Asha; RAMAN, Balasubramanian; KUMAR, Sanjeev et al.Multimedia tools and applications. 2014, Vol 72, Num 3, pp 2225-2248, issn 1380-7501, 24 p.Article

Adaptive non-critical alarm reduction using hash-based contextual signatures in intrusion detectionYUXIN MENG; KWOK, Lam-For.Computer communications. 2014, Vol 38, pp 50-59, issn 0140-3664, 10 p.Article

An Efficient Grid-Based Pairwise Key Predistribution Scheme for Wireless Sensor NetworksWANG, Neng-Chung; CHEN, Young-Long; CHEN, Hong-Li et al.Wireless personal communications. 2014, Vol 78, Num 2, pp 801-816, issn 0929-6212, 16 p.Article

An electronic voting mechanism for fighting bribery and coercionWU, Zhen-Yu; WU, Ju-Chuan; LINA, Sung-Chiang et al.Journal of network and computer applications. 2014, Vol 40, pp 139-150, issn 1084-8045, 12 p.Article

Anonymity and closely related terms in the cyberspace: An analysis by example : Identity Protection and ManagementKAMBOURAKIS, Georgios.Journal of information security and applications. 2014, Vol 19, Num 1, pp 2-17, 16 p.Article

Asynchronous Byzantine Agreement with optimal resiliencePATRA, Arpita; CHOUDHURY, Ashish; PANDU RANGAN, C et al.Distributed computing. 2014, Vol 27, Num 2, pp 111-146, issn 0178-2770, 36 p.Article

Bent functions on partial spreadsLISONEK, Petr; HUI YI LU.Designs, codes and cryptography. 2014, Vol 73, Num 1, pp 209-216, issn 0925-1022, 8 p.Article

Boolean functions with MacWilliams dualityJONG YOON HYUN; HEISOOK LEE; YOONJIN LEE et al.Designs, codes and cryptography. 2014, Vol 72, Num 2, pp 273-287, issn 0925-1022, 15 p.Article

Chaotic Map Based Mobile Dynamic ID Authenticated Key Agreement SchemeLIN, Han-Yu.Wireless personal communications. 2014, Vol 78, Num 2, pp 1487-1494, issn 0929-6212, 8 p.Article

Compressing Encrypted Images With Auxiliary InformationXINPENG ZHANG; YANLI REN; LIQUAN SHEN et al.IEEE transactions on multimedia. 2014, Vol 16, Num 5, pp 1327-1336, issn 1520-9210, 10 p.Article

Computationally Secure Pattern Matching in the Presence of Malicious AdversariesHAZAY, Carmit; TOFT, Tomas.Journal of cryptology. 2014, Vol 27, Num 2, pp 358-395, issn 0933-2790, 38 p.Article

Cooperative Key Agreement for Wireless Networking: Key Rates and Practical Protocol DesignNING WANG; NING ZHANG; GULLIVER, T. Aaron et al.IEEE transactions on information forensics and security. 2014, Vol 9, Num 1-2, pp 272-284, issn 1556-6013, 13 p.Article

Defense Against Primary User Emulation Attacks in Cognitive Radio Networks Using Advanced Encryption StandardALAHMADI, Ahmed; ABDELHAKIM, Mai; REN, Jian et al.IEEE transactions on information forensics and security. 2014, Vol 9, Num 5-6, pp 772-781, issn 1556-6013, 10 p.Article

  • Page / 294