Analysis of a New Improved AES S-box Structure | Rong CHENG |
Romeo: SGX-based Software Anti-Piracy Framework | Yanning Du |
BSSD:A Blockchain-based Trusted Storage Mechanism for Business Data to Support Sustainable Development | Ruyan Liu |
User Authentication Using Body Vibration Characteristics | Yuxuan Zhang |
Anonymous and Practical Multi-Factor Authentication for Mobile Devices Using Two-Server Architecture | Haiyan Cao |
An Improved Authenticated Key Agreement Protocol for IoT and Cloud Server | Yongliu Ma |
A Scheme of Anti Gradient Leakage of Federated Learning Based on Blockchain | Yuanzhen Liu |
Efficient two-party authentication key agreement protocol using reconciliation mechanism from lattice | wang jinhua |
Network Situation Awareness Model based on Incomplete Information Game | 尹 彦 |
Social Internet of Tings trust management based on implicit social relationship | Fan Fan |
Cross-chain Data Auditing for Medical IoT Data Sharing | Kuan Fan |
Outsourced Privacy-Preserving SVM Classifier Model over Encrypted Data in IoT | Chen Wang |
P-TECS Opportunistic Routing Algorithm Integrating Multiple Node Attributes | Gang Xu |