Linked e-resources

Details

Dynamic Security Analysis of Zoom, Google Meet and Microsoft Teams
A Secure Encapsulation Schemes based on Key Recovery System
Path Authentication Protocol: Based on a Lightweight MAC and a Nonlinear Filter Generator
STRISA: A New Regulation Architecture to Enforce Travel Rule
Post-Quantum Hash-Based Signatures for Secure Boot
Exploring the Coverage of Existing Hardware Vulnerabilities in Community Standards
MurQRI: Encrypted Multi-Layer QR Codes for Electronic Identity Management
SpartanGold: A Blockchain for Education, Experimentation, and Rapid Prototyping
BIOT: A blockchain-based IoT Platform for Distributed Energy Resource Management
A Privacy Preserving E-voting System based on Blockchain
Reconstructing Classification to Enhance Machine-Learning Based Network Intrusion Detection by Embracing Ambiguity
ConTheModel: Can we modify tweets to confuse classifier models?
A Systematic Approach to Building Autoencoders for Intrusion Detection
An Attack on Quantum Circuits Based on the Error Rates of NISQ Systems and a Countermeasure
Cryptocurrency with Multiple Sequence Alignment Proof-of-Work
IoT Checker Using Timing Side-channel and Machine Learning.

Browse Subjects

Show more subjects...

Statistics

from
to
Export