Академический Документы
Профессиональный Документы
Культура Документы
N
o.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
Project
ID
FL16IF00
1
FL16IF00
2
FL16IF00
3
FL16IF00
4
FL16IF00
5
FL16IF00
6
FL16IF00
7
FL16IF00
8
FL16IF00
9
FL16IF01
0
FL16IF01
1
FL16IF01
2
FL16IF01
3
FL16IF01
4
FL16IF01
15 5
FL16IF01
16 6
FL16IF01
17 7
FL16IF01
18 8
FL16IF01
19 9
FL16IF02
20 0
FL16IF02
21 1
Information and
Forensic/Titles (2016-17)
2DCrypt: Image Scaling and Cropping in Encrypted Domains
A high-security EEG-based login system with RSVP stimuli and
dry electrodes
A Reversible Data Hiding Scheme Based on Code Division
Multiplexing
A Unified Resource Allocation Framework for Defending against
Pollution Attacks in Wireless Network Coding Systems
An Exploration of Geographic Authentication Schemes
CDMA System Design and Capacity Analysis under Disguised
Jamming
Cherry-Picking Reliable PUF Bits with Differential Sequence
Coding
Comparative studies of passive imaging in terahertz and midwavelength infrared ranges for object detection
Cryptographic Hierarchical Access Control for Dynamic
Structures
Cryptoleq: A Heterogeneous Abstract Machine for Encrypted
and Unencrypted Computation
DDOA: A Dirichlet-based Detection Scheme for Opportunistic
Attacks in Smart Grid Cyber-Physical System
Delay-Aware Optimization of Physical Layer Security in MultiHop Wireless Body Area Networks
Detecting Facial Retouching Using Supervised Deep Learning
Discriminant Correlation Analysis: Real-Time Feature Level
Fusion for Multimodal Biometric Recognition
DW-AES: A Domain-wall Nanowire Based AES for High
Throughput and Energy-efficient Data Encryption in Nonvolatile Memory
Efficient and Anonymous Mobile User Authentication Protocol
Using Self-certified Public Key Cryptography for Multi-server
Architectures
Efficient Deniably Authenticated Encryption and Its Application
to E-mail
Exploiting Path Diversity for Thwarting Pollution Attacks in
Named Data Networking
ForenVisor: A Tool for Acquiring and Preserving Reliable Data in
Cloud Live Forensics
From Clothing to Identity; Manual and Automatic Soft
Biometrics
Full Frame Encryption and Modulation Obfuscation Using
Channel-independent Preamble Identifier
FL16IF02
22 2
FL16IF02
23 3
FL16IF02
24 4
FL16IF02
25 5
FL16IF02
26 6
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
FL16IF02
7
FL16IF02
8
FL16IF02
9
FL16IF03
0
FL16IF03
1
FL16IF03
2
FL16IF03
3
FL16IF03
4
FL16IF03
5
FL16IF03
6
FL16IF03
7
FL16IF03
8
FL16IF03
9
FL16IF04
0
FL16IF04
1
FL16IF04
2
FL16IF04
3
FL16IF04
4