Linked e-resources

Details

IoT Security
A Secure and Efficient Heterogeneous Signcryption Scheme for IIoT
A Federated Learning Based Privacy-Preserving Data Sharing Scheme for Internet of Vehicles
LightGBM-RF: A Hybrid Model for Anomaly Detection in Smart Building
Enabling Hidden Frequency Keyword-Based Auditing on Distributed Architectures for a Smart Government
A Lightweight Certificateless Searchable Public Key Encryption Scheme for Medical Internet of Things
Artificial Intelligence and Cyber Security
Cross-site Scripting Threat Intelligence Detection based on Deep Learning
Power Analysis Attack Based on Lightweight Convolutional Neural Network
Enhancing Port Scans Attack Detection Using Principal Component Analysis and Machine Learning Algorithms
SVFLS: A Secure and Verifiable Federated Learning Training Scheme
A Pragmatic Label-Specific Backdoor Attack
Threat Landscape Across Multiple Cloud Service Providers Using Honeypots as an Attack Source
Blockchain Technology and Application
AP-HBSG: Authentication Protocol for Heterogeneous Blockchain-based Smart Grid environment
Blockchain-based Patient-to-Patient Health Data Sharing
Efficient and Automatic Pseudonym Management Scheme for VANET with Blockchain
Ethereum Contract Honeypot Risk Analysis
A Gas Cost Analytical Approach based on Certificateless Key Encapsulation Protocol for Medicalized blockchains
Cryptography
A Universal Lightweight Privacy-Preserving Multifunctional Data Handling Scheme
New Trapdoor and Preimage Sampling on NTRU Lattice
Secure EHR Sharing Scheme Based on Limited Sanitizable Signature
A Rotating Multi-Secret Color Visual Cryptography Scheme Based on Meaningful Shares
Updatable ElGamal Encryption Scheme with Forward and Backward Security for Cloud Storage
Database Security
A Comparative Analysis of Security Features and Concerns in NoSQL Databases Scheme
Improving Online Restore Performance of Backup Storage via Historical File Access Pattern
Securely and Efficiently Nearest Neighbor Query Scheme Based on Additive Secret Sharing
Quantum Cryptography
Quantum Information Splitting Scheme of Arbitrary Three-qubit State by Using a Four-qubit Cluster State and a Bell sate
Network Security
A Manipulated Overlapped Voltage Attack Detection Mechanism for Voltage Based Vehicle Intrusion Detection System.

Browse Subjects

Show more subjects...

Statistics

from
to
Export