Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 23 matches
- 2018
- Sherman S. M. Chow:
Privacy-Preserving Machine Learning. FCS 2018: 3-6 - Lihua Dong, Jie Wang, Shuo Zhang:
Novel Analysis of Stream Cipher Combing LFSR and FCSR. FCS 2018: 23-38 - Yanyan Han, Guohao Li, Binbin Feng:
An SDN-Based Wireless Authentication and Access Control Security Solution. FCS 2018: 179-189 - Charles R. Haruna, Mengshu Hou, Moses Jojo Eghan, Michael Y. Kpiebaareh, Lawrence Tandoh:
A Hybrid Data Deduplication Approach in Entity Resolution Using Chromatic Correlation Clustering. FCS 2018: 153-167 - Jinqiu Hou, Mingming Jiang, Yuyan Guo, Wangan Song:
Identity-Based Multi-bit Proxy Re-encryption Over Lattice in the Standard Model. FCS 2018: 110-118 - Chunhua Jin, Guanhua Chen, Changhui Yu, Jianyang Zhao:
Heterogeneous Deniable Authentication for E-Voting Systems. FCS 2018: 41-54 - Rui Jin, Yidong Yuan, Ruishan Xin, Jie Gan, Xiaobo Hu, Yanyan Yu, Na Li, Yiqiang Zhao:
Active Shield Design for Security Chip in Smart Grid. FCS 2018: 273-281 - Lin Li, Mingyu Fan, Guangwei Wang:
LWSQR: Lightweight Secure QR Code. FCS 2018: 241-255 - Zhaoqi Li, Yuyang Zhou:
Secure and Achievable Heterogeneous Access Control Scheme for Wireless Body Area Networks. FCS 2018: 190-198 - Pengfei Liang, Leyou Zhang, Yujie Shang:
Novel Secure Privacy-Preserving Decentralized Attribute-Based Encryption. FCS 2018: 66-80 - Hua Ma, Guohua Tian, Zhenhua Liu, Linchao Zhang:
Secure Data Deduplication with Ownership Management and Sharing in Cloud Storage. FCS 2018: 168-176 - Kashi Neupane:
One-Round Authenticated Group Key Establishment Using Multilinear Maps. FCS 2018: 55-65 - Danni Wang, Juntao Gao, Haiyong Yu, Xuelian Li:
A Novel Digital Rights Management in P2P Networks Based on Bitcoin System. FCS 2018: 227-240 - Zilong Wang, Honggang Hu:
Efficient KEA-Style Lattice-Based Authenticated Key Exchange. FCS 2018: 96-109 - Yong Wang, Abdelrhman Hassan, Xiaoran Duan, Xiaodong Yang, Yiquan Zhang, Xiaosong Zhang:
An Authentication Approach for Multiple-User Location-Based Queries. FCS 2018: 256-270 - Xiaofei Wang, Longcheng Yang, Jun Hu, Hao Dai:
A Violent Behavior Detection Algorithm Combining Streakline Model with Variational Model. FCS 2018: 216-224 - Juan Wang, Haoxi Zhang, Fei Li, Zuli Wang, Jun Zhao:
Intelligent Vehicle Knowledge Representation and Anomaly Detection Using Neural Knowledge DNA. FCS 2018: 201-215 - Chenhuang Wu, Chunxiang Xu:
On k-error Linear Complexity of Zeng-Cai-Tang-Yang Generalized Cyclotomic Binary Sequences of Period p2. FCS 2018: 9-22 - Ning Yang, Yueyu Zhang:
A Radio Frequency Fingerprint Extraction Method Based on Cluster Center Difference. FCS 2018: 282-298 - Peng Zhang, Juntao Gao, Wenjuan Jia, Xuelian Li:
Compressive Sensing Encryption Scheme with Anonymous Traitor Tracing for Cloud Storage Security. FCS 2018: 138-152 - Yanhua Zhang, Yong Gan, Yifeng Yin, Huiwen Jia, Mingming Jiang:
Efficient Lattice FIBS for Identities in a Small Universe. FCS 2018: 83-95 - Jining Zhao, Chunxiang Xu, Kefei Chen:
Analysis and Improvement of an Efficient and Secure Identity-Based Public Auditing for Dynamic Outsourced Data with Proxy. FCS 2018: 121-137 - Fagen Li, Tsuyoshi Takagi, Chunxiang Xu, Xiaosong Zhang:
Frontiers in Cyber Security - First International Conference, FCS 2018, Chengdu, China, November 5-7, 2018, Proceedings. Communications in Computer and Information Science 879, Springer 2018, ISBN 978-981-13-3094-0 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-29 04:05 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint