Linked e-resources

Details

AIBlock - Application Intelligence and Blockchain Security
Universal Physical Adversarial Attack via Background Image
Efficient Verifiable Boolean Range Query for Light Clients on Blockchain Database
SuppliedTrust: A Trusted Blockchain Architecture for Supply Chains
Towards Interpreting Vulnerability of Object Detection Models via Adver[1]sarial Distillation
Vulnerability Detection for Smart Contract via Backward Bayesian Active Learning
A Multi-Agent Deep Reinforcement Learning-Based Collaborative
Hybrid Isolation Model for Device Application Sandboxing Deployment in Zero Trust Architecture
AIHWS - Artificial Intelligence in Hardware Security
On the Effect of Clock Frequency on Voltage and Electromagnetic Fault Injection
S-box Pooling: Towards More Efficient Side-Channel Security Evaluations
Deep Learning-based Side-channel Analysis against AES Inner Rounds
A side-channel based disassembler for the ARM-Cortex M0
Towards Isolated AI Accelerators with OP-TEE on SoC-FPGAs
Order Vs. Chaos: Multi-trunk classifier for side-channel attack
AIoTS - Artificial Intelligence and Industrial IoT Security
Framework for Calculating Residual Cybersecurity Risk of Threats to Road Vehicles in Alignment with ISO/SAE 21434
Output Prediction Attacks on Block Ciphers using Deep Learning
HolA: Holistic and Autonomous Attestation for IoT Networks
CIMSS - Critical Infrastructure and Manufacturing System Security
The Etiology of Cybersecurity
Outsider Key Compromise Impersonation Attack on a Multi-Factor Authenticated Key Exchange Protocol
Toward Safe Integration of Legacy SCADA Systems in the Smart Grid
Cloud S&P - Cloud Security and Privacy
RATLS: Integrating Transport Layer Security with Remote Attestation
DLPFS: The Data Leakage Prevention FileSystem
Privacy-preserving record linkage using local sensitive hash and private set intersection
SCI - Secure Cryptographic Implementation
UniqueChain: Achieving (Near) Optimal Transaction Settlement Time via Single Leader Election
PEPEC: Precomputed ECC Points Embedded in Certificates and Verified by CT Log Servers
Efficient Software Implementation of GMT-672 and GMT8-542 PairingFriendly Curves for a 128-bit Security Level
SecMT - Security in Mobile Technologies
Leaky Blinders: Information Leakage in Mobile VPNs
Instrumentation Blueprints: Towards Combining Several Android Instrumentation Tools
SiMLA - Security in Machine Learning and its Applications
A Siamese Neural Network for scalable Behavioral Biometrics Authentication
A methodology for training homomorphic encryption friendly neural networks
Scalable and Secure HTML5 Canvas-Based User Authentication
Android Malware Detection Using BERT
POSTERS
POSTER: A Transparent Remote Quantum Random Number Generator Over a Quantum-Safe Link
POSTER: Enabling User-Accountable Mechanisms in Decision Systems
POSTER: Key Generation Scheme Based on Physical Layer
POSTER: ODABE: Outsourced Decentralized CP-ABE in Internet of Things
POSTER: Ransomware detection mechanism - current state of the project.

Browse Subjects

Show more subjects...

Statistics

from
to
Export