All Stories

  1. Blockchain-based root of trust management in security credential management system for vehicular communications
  2. SDN based stealthy TCP connection handover mechanism
  3. Human Weakness
  4. Honeyvers
  5. Traffic Redirection
  6. Taxonomy
  7. Adaptive and Flexible Virtual Honeynet
  8. TIHDL
  9. Free end-to-end data encryption
  10. energy-efficient storage systems in cloud
  11. Three-state disk model
  12. FLV video file cutting
  13. Automatic Train Identification System
  14. RFID technology in the costume sales application system
  15. CUDA based Parallelization of RSA Algorithm
  16. Flexible and Adaptive honeypot design