-
1
Video watermarking algorithm for resisting collusion attacks
Published 2010-01-01Subjects: Get full text
Article -
2
Video watermarking algorithm for resisting collusion attacks
Published 2010-01-01Subjects: “…video watermarking;collusion attack;JND model…”
Get full text
Article -
3
Semi-structured data protection scheme based on robust watermarking
Published 2020-03-01Subjects: Get full text
Article -
4
Towards Privacy in Decentralized IoT: A Blockchain-Based Dual Response DP Mechanism
Published 2024-09-01Subjects: Get full text
Article -
5
Method for detecting collusion attack node in road condition information sharing based on reputation point
Published 2021-04-01Subjects: “…Internet of vehicles;road condition information sharing;blockchain;collusion attack…”
Get full text
Article -
6
Collusion node detection method based on fuzzy evaluation density clustering in Internet of vehicles
Published 2023-07-01Subjects: “…Internet of vehicles;collusion attack;fuzzy comprehensive evaluation;density clustering…”
Get full text
Article -
7
Collusion node detection method based on fuzzy evaluation density clustering in Internet of vehicles
Published 2023-07-01Subjects: Get full text
Article -
8
A Novel Quantum Sequential Signature Protocol With Y-SNOP States
Published 2021-01-01Subjects: Get full text
Article -
9
Malware Collusion Attack against SVM: Issues and Countermeasures
Published 2018-09-01Subjects: Get full text
Article -
10
Collusion Attack Resilient 3D Mesh Watermarking Based on Anti-Collusion Fingerprint Code
Published 2018-06-01Subjects: Get full text
Article -
11
Method for detecting collusion attack node in road condition information sharing based on reputation point
Published 2021-04-01Subjects: Get full text
Article -
12
An Efficient Lightweight Authentication Scheme for Smart Meter
Published 2024-04-01Subjects: Get full text
Article -
13
Improving Privacy-Preserving and Security for Decentralized Key-Policy Attributed-Based Encryption
Published 2018-01-01Subjects: Get full text
Article -
14
Cooperation-based location authentication scheme for crowdsensing applications
Published 2022-09-01Subjects: Get full text
Article -
15
Cooperation-based location authentication scheme for crowdsensing applications
Published 2022-09-01Subjects: “…distance-bounding protocol;location authentication;crowdsensing;collusion attack;reputation incentive…”
Get full text
Article -
16
Privacy protection system based on Hook for Android
Published 2018-04-01Subjects: Get full text
Article -
17
Privacy protection system based on Hook for Android
Published 2018-04-01Subjects: Get full text
Article -
18
Attribute-based encryption scheme supporting attribute revocation in cloud storage environment
Published 2019-05-01Subjects: “…cloud storage;attribute-based encryption;collusion attack;attribute revocation;outsourced decryption…”
Get full text
Article -
19
Attribute-based encryption scheme supporting attribute revocation in cloud storage environment
Published 2019-05-01Subjects: Get full text
Article -
20
A Note on an Improved Self-Healing Group Key Distribution Scheme
Published 2015-09-01Subjects: Get full text
Article