1 | Á¦¸ñ(Title) | Privacy-Preserving Key-Updatable Public Key Encryption with Keyword Search Supporting Ciphertext Sharing Function | |
---|---|---|---|
ÀúÀÚ(Author) | Fen Wang Yang Lu Zhongqi Wang Jinmei Tian | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 16 NO. 01 PP. 0266 ~ 0286 2022. 01 | ||
2 | Á¦¸ñ(Title) | A City-Level Boundary Nodes Identification Algorithm Based on Bidirectional Approaching | |
ÀúÀÚ(Author) | Zhiyuan Tao Fenlin Liu Yan Liu Xiangyang Luo | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 15 NO. 08 PP. 2764 ~ 2782 2021. 08 | ||
3 | Á¦¸ñ(Title) | Microblog User Geolocation by Extracting Local Words Based on Word Clustering and Wrapper Feature Selection | |
ÀúÀÚ(Author) | Hechan Tian Fenlin Liu Xiangyang Luo Fan Zhang Yaqiong Qiao | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 14 NO. 10 PP. 3972 ~ 3988 2020. 10 | ||
4 | Á¦¸ñ(Title) | A Forward-Secure Certificate-Based Signature Scheme with Enhanced Security in the Standard Model | |
ÀúÀÚ(Author) | Yang Lu Jiguo Li | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 13 NO. 03 PP. 1502 ~ 1522 2019. 03 | ||
5 | Á¦¸ñ(Title) | New Construction of Short Certificate-Based Signature against Existential Forgery Attacks | |
ÀúÀÚ(Author) | Yang Lu Gang Wang Jiguo Li Jian Shen | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 11 NO. 07 PP. 3629 ~ 3647 2017. 07 | ||
6 | Á¦¸ñ(Title) | Optimal Gabor Filters for Steganalysis of Content-Adaptive JPEG Steganography | |
ÀúÀÚ(Author) | Xiaofeng Song Fenlin Liu Liju Chen Chunfang Yang Xiangyang Luo | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 11 NO. 01 PP. 0552 ~ 0569 2017. 01 | ||
7 | Á¦¸ñ(Title) | Enhanced Certificate-Based Encryption Scheme without Bilinear Pairings | |
ÀúÀÚ(Author) | Yang Lu Quanling Zhang | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 10 NO. 02 PP. 0881 ~ 0896 2016. 02 | ||
8 | Á¦¸ñ(Title) | Steganalysis of adaptive JPEG steganography by selecting DCT coefficients according to embedding distortion | |
ÀúÀÚ(Author) | Xiaofeng Song Fenlin Liu Chunfang Yang Xiangyang Luo Zhenyu Li | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 09 NO. 12 PP. 5209 ~ 5228 2015. 12 | ||
9 | Á¦¸ñ(Title) | Efficient Certificate-Based Proxy Re-encryption Scheme forData Sharing in Public Clouds | |
ÀúÀÚ(Author) | Yang Lu | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 09 NO. 07 PP. 2703 ~ 2718 2015. 07 | ||
10 | Á¦¸ñ(Title) | A Novel Technique for Human Traffic based Radio Map Updating in Wi-Fi Indoor Positioning Systems | |
ÀúÀÚ(Author) | Yun Mo Zhongzhao Zhang Yang Lu Gul Agha | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 09 NO. 05 PP. 1881 ~ 1903 2015. 05 |
Copyright(c) Computer Science Engineering Research Information Center. All rights reserved.