Special Issue: Securing Distributed Networks and Systems
暂无分享,去创建一个
[1] Yi Mu,et al. Secure mobile agents with controlled resources , 2011, Concurr. Comput. Pract. Exp..
[2] WuJie,et al. Achieving fine-grained access control for secure data sharing on cloud servers , 2011 .
[3] Yang Xiang,et al. A secure and efficient data aggregation scheme for wireless sensor networks , 2011, Concurr. Comput. Pract. Exp..
[4] Ruixuan Li,et al. Specifying and enforcing the principle of least privilege in role‐based access control , 2011, Concurr. Comput. Pract. Exp..
[5] Jie Wu,et al. Achieving fine‐grained access control for secure data sharing on cloud servers , 2011, Concurr. Comput. Pract. Exp..
[6] C. Alcaraz,et al. Secure SCADA framework for the protection of energy control systems , 2011, Concurr. Comput. Pract. Exp..
[7] Christopher Leckie,et al. Self‐similar characteristics of network intrusion attempts and the implications for predictability , 2011, Concurr. Comput. Pract. Exp..
[8] Jing Xu,et al. A generic framework for constructing cross‐realm C2C‐PAKA protocols based on the smart card , 2011, Concurr. Comput. Pract. Exp..
[9] Shi-Jinn Horng,et al. Architecture Design of High Efficient and Non-memory AES Crypto Core for WPAN , 2009, 2009 Third International Conference on Network and System Security.
[10] Andreas Jakoby,et al. A Cryptographically t-Private Auction System , 2009, 2009 Third International Conference on Network and System Security.