Linked e-resources

Details

Cryptography and its applications
Publicly Verifiable Conjunctive Keyword Search with Balanced Verification Overhead
Secure and Efficient Certificateless Authenticated Key Agreement Scheme for Smart Healthcare
Digital Signature Scheme to Match Generalized Reed-Solomon Code over GF(q)
A Collaborative Access Control Scheme based on Incentive Mechanism
Quartet: A Logarithmic Size Linkable Ring Signature Scheme from DualRing
Updatable Hybrid Encryption Scheme with No-directional Key Update for Cloud Storage
Data security
FDLedger: Dynamic and Efficient Anonymous Audit for Distributed Ledgers
A Method of Traceless File Deletion for NTFS File System
Efficient and Collusion Resistant Multi-Party Private Set Intersection Protocols for Large Participants and Small Sets Setting
Attack and defense techniques
High Quality Audio Adversarial Examples without Using Psychoacoustics
Working Mechanism of Eternalblue and Its Application in Ransomworm
Substitution Attacks against Sigma Protocols
A Multi-stage APT Attack Detection Method based on Sample Enhancement
VDHGT: A Source Code Vulnerability Detection Method Based on Heterogeneous Graph Transformer
Network security and its applications
Improvised Model for Blockchain in Distributed Cloud Environment
Multi-hop Multi-key Homomorphic Encryption with Less Noise under CRS Model
Design of Anti-machine Learning Malicious Node System based on Blockchain.

Browse Subjects

Show more subjects...

Statistics

from
to
Export