Search
Now showing items 1-5 of 5
Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security
Publisher: IEEE
Year: 2014
An Efficient Defense Scheme against SIP DoS Attack in SDN Using Cloud SFW
Publisher: IEEE
Year: 2014
Security analysis of secure data aggregation protocols in wireless sensor networks
Publisher: IEEE
Year: 2014
A Design of Elliptic Curve Cryptography-Based Authentication Using QR Code
Publisher: IEEE
Year: 2014