About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
CHINACOM 2009
ChinaCom2009-OCN 2009CRNET 2009ChinaCom2009-WCN 2009IWONCMM 2009ChinaCom2009-NIS 2009ACDMC 2009ChinaCom2009-MCS 2009ChinaCom2009-AIS 2009ChinaCom2009-FCN 2009ChinaCom2009-SPC 2009ChinaCom2009-ICT 2009
Other Years
Ethics and Malpractice Statement

    ChinaCom2009-NIS

    ChinaCom2009-Network and Information Security Symposium

    NIS: Networking and Information Security Symposium

    NIS: Networking and Information Security Symposium

    more »
    Editor(s): Baoyan Duan (Xidian University,China) and Shihua Zhu (Xi'an Jiaotong University,China)
    Publisher
    IEEE
    Conference dates
    26th–27th Aug 2009
    Location
    Xi'an, China
    Appeared in EUDL
    2011-11-29

    Copyright © 2011–2025 IEEE

    Ordered by title or year
    Showing 1–10 of 11 results
    Page size: 102550
    • 1
    • 2
    • Next
    • Last
    • A New Efficient Self-Certified One-Time Short Signature Scheme from Bilinear Pairings

      Research Article in ChinaCom2009-Network and Information Security Symposium

      Renwang Su
    • A new attack strategy for BB84 protocol based on Breidbart basis

      Research Article in ChinaCom2009-Network and Information Security Symposium

      LIU Dan, PEI Chang-xing, QUAN Dong-xiao, HAN Bao-bin, ZHAO Nan
    • About the Security for HW Threshold Proxy Signature Scheme with self-certified Public Key System

      Research Article in ChinaCom2009-Network and Information Security Symposium

      Fengying Li, Qingshui Xue, Jiping Zhang, Zhenfu Cao
    • An Authentication Scheme for Three-Party Mobile Conditional Access system(CAS)

      Research Article in ChinaCom2009-Network and Information Security Symposium

      Yi-Chun ZHANG, Cheng YANG, Jian-Bo LIU, Jia-Yin TIAN
    • An Efficient Hardware Architecture for Deep Packet Inspection in Hybrid Intrusion Detection Systems

      Research Article in ChinaCom2009-Network and Information Security Symposium

      Mohammad Amin Taherkhani, Maghsoud Abbaspour
    • Comment on Kang et al.’s identity-based strong designated verifier signature scheme

      Research Article in ChinaCom2009-Network and Information Security Symposium

      Renwang Su
    • Copyright Protection of Multimedia Content Using Homomorphic Public Key Cryptosystems

      Research Article in ChinaCom2009-Network and Information Security Symposium

      Zhongwei Sun, Yaning Ma
    • Enhancing Attribute-Based Encryption with Attribute Hierarchy

      Research Article in ChinaCom2009-Network and Information Security Symposium

      Jin Li, Qian Wang, Cong Wang, Kui Ren
    • Incremental PID-like Algorithm Based Trust Model in Peer-to-peer Networks

      Research Article in ChinaCom2009-Network and Information Security Symposium

      Jianguo Chen, Wai K. Yeap, Stefan D. Bruda
    • One-way Quantum Secure Direct Communication based on Single Photons

      Research Article in ChinaCom2009-Network and Information Security Symposium

      QUAN Dong-xiao, PEI Chang-xing, LIU Dan, ZHAO Nan
    • 1
    • 2
    • Next
    • Last
    EBSCOProQuestDBLPDOAJPortico
    EAI Logo

    About EAI

    • Who We Are
    • Leadership
    • Research Areas
    • Partners
    • Media Center

    Community

    • Membership
    • Conference
    • Recognition
    • Sponsor Us

    Publish with EAI

    • Publishing
    • Journals
    • Proceedings
    • Books
    • EUDL