Publications
Search

Publications :: Search

Show venue

On this page you see the details of the selected venue.

    Journal
    Name: Security and Communication Networks
    Year: 2017
    Volume: 2017
    DBLP: db/journals/scn/scn2017.html
    Bookmark:

    Below you find the publications assigned to this venue.

    Show item 1 to 10 of 156  
    Select a publication
    Show Title Venue Rating Date
    Journal article
    Donghui Hu, Qiang Shen, Shengnan Zhou, Xueliang Liu, Yuqi Fan, Lina Wang.
    Adaptive Steganalysis Based on Selection Region and Combined Convolutional Neural Networks.
    Security and Communication Networks 2017, Volume 2017 (0) 2017
    Journal article
    Shihong Zou, Yanhong Xu, Honggang Wang, Zhouzhou Li, Shanzhi Chen, Bo Hu.
    A Survey on Secure Wireless Body Area Networks.
    Security and Communication Networks 2017, Volume 2017 (0) 2017
    Journal article
    Jiankuo Dong, Fangyu Zheng, Wuqiong Pan, Jingqiang Lin, Jiwu Jing, Yuan Zhao.
    Utilizing the Double-Precision Floating-Point Computing Power of GPUs for RSA Acceleration.
    Security and Communication Networks 2017, Volume 2017 (0) 2017
    Journal article
    Hector Santoyo-Garcia, Eduardo Fragoso-Navarro, Rogelio Reyes-Reyes, Clara Cruz-Ramos, Mariko Nakano-Miyatake.
    Visible Watermarking Technique Based on Human Visual System for Single Sensor Digital Cameras.
    Security and Communication Networks 2017, Volume 2017 (0) 2017
    Journal article
    Mirko Köhler, Ivica Lukic, Visnja Krizanovic.
    Protecting Information with Subcodstanography.
    Security and Communication Networks 2017, Volume 2017 (0) 2017
    Journal article
    Yujia Liu, Weiming Zhang, Nenghai Yu.
    Protecting Privacy in Shared Photos via Adversarial Examples Based Stealth.
    Security and Communication Networks 2017, Volume 2017 (0) 2017
    Journal article
    Dhruti Sharma, Devesh C. Jinwala.
    Multiuser Searchable Encryption with Token Freshness Verification.
    Security and Communication Networks 2017, Volume 2017 (0) 2017
    Journal article
    Yiyuan Luo, Xuejia Lai.
    Improvements for Finding Impossible Differentials of Block Cipher Structures.
    Security and Communication Networks 2017, Volume 2017 (0) 2017
    Journal article
    Lukasz Krzywiecki, Tomasz Wlislocki.
    Deniable Key Establishment Resistance against eKCI Attacks.
    Security and Communication Networks 2017, Volume 2017 (0) 2017
    Journal article
    Xingchun Yang, Chunxiang Xu, Chao Rong Li.
    A Privacy Model for RFID Tag Ownership Transfer.
    Security and Communication Networks 2017, Volume 2017 (0) 2017
    Show item 1 to 10 of 156  

    Your query returned 156 matches in the database.