• Cryptanalysis of Salsa and ChaCha: Revisited

  • An Energy Saving Mechanism Based on Vacation Queuing Theory in Data Center Networks

  • Application of Fuzzy Comprehensive Evaluation Method for Reservoir Well Logging Interpretation While Drilling

  • Towards Developing Network Forensic Mechanism for Botnet Activities in the IoT Based on Machine Learning Techniques

  • A Cache-Aware Congestion Control for Reliable Transport in Wireless Sensor Networks

  • A New Lightweight Mutual Authentication Protocol to Secure Real Time Tracking of Radioactive Sources

  • Robust Fingerprint Matching Based on Convolutional Neural Networks

  • Application of 3D Delaunay Triangulation in Fingerprint Authentication System

  • Designing Anomaly Detection System for Cloud Servers by Frequency Domain Features of System Call Identifiers and Machine Learning

  • A Personalized Multi-keyword Ranked Search Method Over Encrypted Cloud Data