Search


Current filters:


Start a new search
Add filters:

Use filters to refine the search results.


Results 1-10 of 13 (Search time: 0.001 seconds).
Item hits:
PreviewIssue DateTitleAuthor(s)
2008Privacy preserving set intersection based on bilinear groupsSang, Y.; Shen, H.; Australasian Computer Science Conference (31st : 2008 : Wollongong, NSW)
2007An observation-centric analysis on the modeling of anomaly-based intrusion detectionZhang, Z.; Shen, H.; Sang, Y.
2006Efficient protocols for privacy preserving matching against distributed datasetsSang, Y.; Shen, H.; Tan, Y.; Xiong, N.; Ning, P.; Qing, S.; Li, N.; International Conference on Information and Communications Security (8th : 2006 : Raleigh, N.C.)
2008On secure distributed data sharingSang, Y.; Shen, H.; Inaugural Symposium on Parallel Algorithms, Architectures and Programming (2008 : Hefei, China)
2007Privacy preserving set intersection protocol secure against malicious behaviorsSang, Y.; Shen, H.; Munro, D.; International Conference on Parallel and Distributed Computing, Applications and Technologies (8th : 2007 : Adelaide, South Australia)
2005An efficient protocol for the problem of secure two-party vector dominanceSang, Y.; Shen, H.; Zhang, Z.; International Conference on Parallel and Distributed Computing, Applications and Technologies (6th : 2005 : Dalian, China)
2006Secure data aggregation in wireless sensor networks: A surveySang, Y.; Shen, H.; Inoguchi, Y.; Tan, Y.; Xiong, N.; Horng, S.; Yang, C.; International Conference on Parallel and Distributed Computing, Applications and Technologies (7th : 2006 : Taipei, Taiwan)
2009Privacy-preserving tuple matching in distributed databasesSang, Y.; Shen, H.; Tian, H.
2009Efficient and secure protocols for privacy-preserving set operationsSang, Y.; Shen, H.
2005Novel impostors detection in keystroke dynamics by support vector machineSang, Y.; Shen, H.; Fan, P.; International Conference on Parallel and Distributed Computing, Applications and Technologies (5th : 2004 : Singapore)