Linked e-resources

Details

KRAKEN: A Knowledge-Based Recommender system for Analysts, to Kick Exploration up a Notch
ADAM: Automatic Detection of Android Malware
Attack on the Common Prime Version of Murru and Saettone's RSA Cryptosystem
Identification of Data Breaches from Public Forums
A Forensic Framework for Webmail Threat Detection using Log Analysis
An Evaluation of the Multi-Platform Efficiency of Lightweight Cryptographic Permutations
Optimized Implementation of SHA-512 for 16-bit MSP430 Microcontrollers
Limitations of the Use of Neural Networks in Black Box Cryptanalysis
Improved polynomial multiplication algorithms over characteristic three fields and applications to NTRU Prime
An optimization of Bleichenbacher s Oracle Padding Attack
UC Analysis of the Randomized McElieceCryptosystem
Using Five Cards to Encode Each Integer in Z/6Z
Conditional Differential Cryptanalysis on Bagua
Perfect Anonymous Authentication and Secure Communication in Internet-of-Things
Flexible Group Non-Interactive Key Exchange in the Standard Model
A Multifunctional Modular Implementation of Grover's Algorithm
Lightweight Swarm Authentication
New Configurations of Grain Ciphers: Security Against Slide Attacks
Improved security solutions for DDoS mitigation in 5G Multi-access Edge Computing
Long-Term Secure Asymmetric Group Key Agreement
Building deobfuscated applications from polymorphic binaries
Viruses, Exploits, Malware and Security Issues on IoT Devices.

Browse Subjects

Show more subjects...

Statistics

from
to
Export