NETWORK SECURITY 2019-2020
NETWORK SECURITY 2019-2020
S.NO |
NETWORK SECURITY 2019-2020 |
DOWNLOAD LINK CLICK |
OK9NS01 |
A Highly Efficient Side Channel Attack with Profiling through Relevance-Learning on Physical Leakage Information |
|
OK9NS02 |
A Secure Exception Mode for Fault-Attack-Resistant Processing |
|
OK9NS03 |
AccConF An Access Control Framework for Leveraging In-Network Cached Data in the ICN-Enabled Wireless Edge |
|
OK9NS04 |
Adding Support for Automatic Enforcement of Security Policies in NFV Networks |
|
OK9NS05 |
Advancing the State-of-the-Art in Hardware Trojans Detection |
|
OK9NS06 |
Atlas Application Confidentiality in Compromised Embedded Systems |
|
OK9NS07 |
Building a Trustworthy Execution Environment to Defeat Exploits from both Cyber Space and Physical Space for ARM |
|
OK9NS08 |
Building PUF Based Authentication and Key Exchange Protocol for IoT Without Explicit CRPs in Verifier Database |
|
OK9NS09 |
Ciphertext-Only Fault Analysis on the LED Lightweight Cryptosystem in the Internet of Things |
|
OK9NS10 |
Cryptographic Solutions for Credibility and Liability Issues of Genomic Data |
|
OK9NS11 |
Decay-Based DRAM PUFs in Commodity Devices |
|
OK9NS12 |
Defending Against Web Application Attacks Approaches, Challenges and Implications |
|
OK9NS13 |
Defending Against Web Application Attacks Approaches, Challenges and Implications |
|
OK9NS14 |
Design and Implementation of the Ascend Secure Processor |
|
OK9NS15 |
Detecting Fault Injection Attacks Based on Compressed Sensing and Integer Linear Programming |
|
OK9NS16 |
Efficient and Private Scoring of Decision Trees, Support Vector Machines and Logistic Regression Models Based on Pre-Computation |
|
OK9NS17 |
Emerging Attacks and Solutions for Secure Hardware in the Internet of Things |
|
OK9NS18 |
Estimating Cardinality of Arbitrary Expression of Multiple Tag Sets in a Distributed RFID System |
|
OK9NS19 |
Evolving Bipartite Authentication Graph Partitions |
|
OK9NS20 |
Exact Inference Techniques for the Analysis of Bayesian Attack Graphs |
|
OK9NS21 |
Fast Data Plane Testing for Software-Defined Networks With RuleChecker |
|
OK9NS22 |
FastGeo Efficient Geometric Range Queries on Encrypted Spatial Data |
|
OK9NS23 |
Fault-Tolerant Adaptive Routing in Dragonfly Networks |
|
OK9NS24 |
Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems |
|
OK9NS25 |
GaitLock Protect Virtual and Augmented Reality Headsets Using Gait |
|
OK9NS26 |
G-SIR An Insider Attack Resilient Geo-Social Access Control Framework |
|
OK9NS27 |
HAL—The Missing Piece of the Puzzle for Hardware Reverse Engineering, Trojan Detection and Insertion |
|
OK9NS28 |
High Rate Robust Codes with Low Implementation Complexity |
|
OK9NS29 |
Investigating the Multi-Ciphersuite and Backwards-Compatibility Security of the Upcoming TLS 1.3 |
|
OK9NS30 |
KI-Mon ARM A Hardware-Assisted Event-triggered Monitoring Platform for Mutable Kernel Object |
|
OK9NS31 |
Leveraging Compression-Based Graph Mining for Behavior-Based Malware Detection |
|
OK9NS32 |
Memory-Efficient Implementation of Elliptic Curve Cryptography for the Internet-of-Things |
|
OK9NS33 |
Optimal Spot-Checking for Collusion Tolerance in Computer Grids |
|
OK9NS34 |
Optimizing Gradual SDN Upgrades in ISP Networks |
|
OK9NS35 |
PersonaIA A Lightweight Implicit Authentication System based on Customized User Behavior Selection |
|
OK9NS36 |
Privacy-Aware Caching in Information-Centric Networking |
|
OK9NS37 |
Privacy-Preserving Aggregate Queries for Optimal Location Selection |
|
OK9NS38 |
Privacy-Preserving Multi-Keyword Top-k k Similarity Search Over Encrypted Data |
|
OK9NS39 |
Refinement-Based Specification and Security Analysis of Separation Kernels |
|
OK9NS40 |
SADI A Novel Model to Study the Propagation of Social Worms in Hierarchical Networks |
|
OK9NS41 |
SADI A Novel Model to Study the Propagation of Social Worms in Hierarchical Networks |
|
OK9NS42 |
Security Pricing as Enabler of Cyber-Insurance A First Look at Differentiated Pricing Markets |
|
OK9NS43 |
Stochastic Model Checking for Predicting Component Failures and Service Availability |