Linked e-resources

Details

Cryptography and its applications
Improved (t,n)-Threshold Proxy Signature Scheme
Algorithm Substitution Attacks on Identity-Based Encryption
Authenticated Continuous Top-k Spatial Keyword Search on Dynamic Objects
Efficient Attribute-based Proxy Re-encryption for Secure Deduplication
A Secure Word Vector Training Scheme Based on Inner-Product Functional Encryption
D2D Authentication Scheme for IoT-enabled Smart Home
Inner Product Encryption from Middle-Product Learning with Errors
Network security and privacy protection
Publicly Verifiable Private Set Intersection from Homomorphic Encryption
Secure Asynchronous Federated Learning for Edge Computing Devices
FedBC: An Efficient and Privacy-preserving Federated Consensus Scheme
A Secure and Privacy-preserving Authentication Scheme in IoMT
Secure and Efficient k-Nearest Neighbor Query with Privacy-Preserving Authentication
A Network Security Situation Assessment Method Based on Multi-attention Mechanism and HHO-ResNeXt
A Privacy-Preserving Federated Learning with Mutual Verification on Vector Spaces
Data detection
Patch-based Backdoors Detection and Mitigation with Feature Masking
Detection and Defense Against DDoS Attack on SDN Controller Based on Feature Selection
Commodity-Tra: A Traceable Transaction Scheme Based on FISCO BCOS
A Defect Heterogeneous Risk Assessment Method with Misclassification Cost
Squeeze-Loss: A Utility-Free Defense Against Membership Inference Attacks
Blockchain and its applications
Improved WAVE Signature and Apply to Post-Quantum Blockchain
Secure Government Data Sharing Based on Blockchain and Attribute-Based Encryption
Secure Data Storage Scheme of Judicial System based on Blockchain
Judicial Evidence Storage Scheme Based on Smart Contract.

Browse Subjects

Show more subjects...

Statistics

from
to
Export