Publications
Search

Publications :: Search

Show venue

On this page you see the details of the selected venue.

    Journal
    Name: Security and Communication Networks
    Year: 2015
    Volume: 8
    Number: 1
    DBLP: db/journals/scn/scn8.html
    Bookmark:

    Below you find the publications assigned to this venue.

    Show item 1 to 10 of 350  
    Select a publication
    Show Title Venue Rating Date
    Journal article
    Shengbao Wang, Zhenfu Cao, Qi Xie, Wenhao Liu.
    Practical identity-based encryption in multiple private key generator (PKG) environments.
    Security and Communication Networks 2015, Volume 8 (0) 2015
    Journal article
    Lei Jiang, Jianlong Tan, Qiu Tang.
    An efficient sparse matrix format for accelerating regular expression matching on field-programmable gate arrays.
    Security and Communication Networks 2015, Volume 8 (0) 2015
    Journal article
    Li Tao, Hu Aiqun.
    Efficient trust chain model based on turing machine.
    Security and Communication Networks 2015, Volume 8 (0) 2015
    Journal article
    Lejun Fan, Yuanzhuo Wang, Xueqi Cheng, Jinming Li, Shuyuan Jin.
    Privacy theft malware multi-process collaboration analysis.
    Security and Communication Networks 2015, Volume 8 (0) 2015
    Journal article
    Xian Liu.
    Secrecy capacity of wireless channels subject to log-normal fading.
    Security and Communication Networks 2015, Volume 8 (0) 2015
    Journal article
    Xiang Cui, Lihua Yin, Shuyuan Jin, Zhiyu Hao, Shuhao Li.
    Botnet spoofing: fighting botnet with itself.
    Security and Communication Networks 2015, Volume 8 (0) 2015
    Journal article
    Buyun Qu, Zhibin Zhang, Xingquan Zhu, Dan Meng.
    An empirical study of morphing on behavior-based network traffic classification.
    Security and Communication Networks 2015, Volume 8 (0) 2015
    Journal article
    Xueqi Cheng, Jinhong Yuan, Ali Tajer, Aiqun Hu, Wanlei Zhou.
    Special issue on recent advances in network and information security - security and communication networks journal.
    Security and Communication Networks 2015, Volume 8 (0) 2015
    Journal article
    Jian Li, DanJie Song, Ruifan Li, Xiaofeng Lu.
    A quantum secure direct communication protocol based on four-qubit cluster state.
    Security and Communication Networks 2015, Volume 8 (0) 2015
    Conference paper
    Ji-Jian Chin, Rouzbeh Behnia, Swee-Huay Heng, Raphael C.-W. Phan.
    Cryptanalysis of a certificateless identification scheme.
    Security and Communication Networks 2015, Volume 8 (0) 2015
    Show item 1 to 10 of 350  

    Your query returned 350 matches in the database.