Digital Library
Search Results: [ keyword: ICA ] (701)
102.
A Pioneer Scheme in the Detection and Defense of DrDoS Attack Involving Spoofed Flooding Packets
Kavisankar L,
Chellappan C,
Sivasankar P,
Ashwin Karthi1,
Srinivas A,
Vol. 8, No. 5, May 28, 2014
10.3837/tiis.2014.05.013
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Mujun Qian,
Chen Liu,
Youhua Fu,
Weiping Zhu,
Vol. 8, No. 4, April 28, 2014
10.3837/tiis.2014.04.013
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
108.
Toward Efficient Convertible Authenticated Encryption Schemes Using Self-Certified Public Key System
Lih-Chyau Wuu,
Chi-Hsiang Hung,
Wen-Chung Kuo,
Vol. 8, No. 3, March 30, 2014
10.3837/tiis.2014.03.025
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)