浏览/检索结果:共9条,第1-9条

已选(0)清除 条数/页:   排序方式:
Risk Quantification of Privacy Management in Vehicular Ad Hoc Networks 会议论文
Proceedings - 2022 IEEE SmartWorld, Ubiquitous Intelligence and Computing, Autonomous and Trusted Vehicles, Scalable Computing and Communications, Digital Twin, Privacy Computing, Metaverse (SmartWorld/UIC/ATC/ScalCom/DigitalTwin/PriComp/Metaverse), Haikou, China, 15-18 December 2022
作者:  Liu, Gang;  Hou, Ricky Yuen Tan
收藏  |  浏览/下载:14/0  |  提交时间:2024/06/17
Blind detection of spread spectrum flow watermarks 期刊论文
Security and Communication Networks,2013, 卷号: 6, 期号: 3, 页码: 257-274
作者:  Jia, Weijia;  Tso, Fung Po;  Ling, Zhen;  Fu, Xinwen;  Xuan, Dong
收藏  |  浏览/下载:12/0  |  提交时间:2021/05/10
Protocol-level attacks against Tor 期刊论文
Computer Networks,2013, 卷号: 57, 期号: 4, 页码: 869-886
作者:  Ling, Zhen;  Luo, Junzhou;  Yu, Wei;  Fu, Xinwen;  Jia, Weijia
收藏  |  浏览/下载:8/0  |  提交时间:2021/05/10
Further improvement of an authentication scheme with user anonymity for wireless communications 期刊论文
International Journal of Network Security,2012, 卷号: 14, 期号: 5, 页码: 297-300
作者:  Hu,Jianbin;  Xiong,Hu;  Chen,Zhong
收藏  |  浏览/下载:1/0  |  提交时间:2025/08/05
Bidder-anonymous English auction protocol based on revocable ring signature 期刊论文
Expert Systems with Applications,2012, 卷号: 39, 期号: 8, 页码: 7062-7066
作者:  Xiong,Hu;  Chen,Zhong;  Li,Fagen
收藏  |  浏览/下载:3/0  |  提交时间:2025/08/05
An anonymous wireless authentication protocol based on proxy signature 期刊论文
Journal of Computational Information Systems,2012, 卷号: 8, 期号: 2, 页码: 541-548
作者:  Jiang, Chunlin;  Jia, Weijia;  Gu, Ke
收藏  |  浏览/下载:9/0  |  提交时间:2021/05/10
Attacking anonymous web browsing at local area networks through browsing dynamics 期刊论文
Computer Journal,2012, 卷号: 55, 期号: 4, 页码: 410-421
作者:  Yu, Shui;  Zhou, Wanlei;  Jia, Weijia;  Hu, Jiankun
收藏  |  浏览/下载:5/0  |  提交时间:2021/05/10
A new cell-counting-based attack against tor 期刊论文
IEEE/ACM Transactions on Networking,2012, 卷号: 20, 期号: 4, 页码: 1245-1261
作者:  Ling, Zhen;  Luo, Junzhou;  Yu, Wei;  Fu, Xinwen;  Xuan, Dong
收藏  |  浏览/下载:8/0  |  提交时间:2021/05/10
A new cell counter based attack against Tor 会议论文
Proceedings of the ACM Conference on Computer and Communications Security, Chicago, Illinois, USA, NOV 09-13, 2009
作者:  Ling, Zhen;  Luo, Junzhou;  Yu, Wei;  Fu, Xinwen;  Xuan, Dong
收藏  |  浏览/下载:9/0  |  提交时间:2021/07/30