Linked e-resources

Details

Cryptography
Privacy Preserving Computation in Cloud Using Reusable Garbled Oblivious RAMs
Efficient Private Set Intersection Cardinality Protocol in the Reverse Unbalanced Setting
Crypto-Steganographic Validity for Additive Manufacturing (3D Printing) Design Files
Witness Encryption from Smooth Projective Hashing System
Post-Quantum Cryptography
More Efficient Adaptively Secure Lattice-based IBE with Equality Test in the Standard Model
QUIC Protocol with Post-Quantum Authentication
Batched Fully Homomorphic Encryption from TFHE
Implicit Rejection in Fujisaki-Okamoto: Framework and a Novel Realization
Cryptanalysis
Further Cryptanalysis of a Type of RSA Variants
The SAT-Based Automatic Searching and Experimental Verification for Differential Characteristics with Application to Midori64
Efficient Scalar Multiplication on Koblitz Curves with Pre-computation
Blockchain
Efficient ECDSA-based Adaptor Signature for Batched Atomic Swaps
Searching for Encrypted Data on Blockchain: An Efficient, Secure and Fair Realization
GRUZ : Practical Resource Fair Exchange without Blockchain
Daric: A Storage Efficient Payment Channel With Punishment Mechanism
A Blockchain-based Mutual Authentication Protocol for Smart Home
Email and Web Security
OblivSend: Secure and Ephemeral File Sharing Services with Oblivious Expiration Control
EarlyCrow: Detecting APT Malware Command and Control Over HTTP(S) Using Contextual Summaries
Malware
ATLAS: A Practical Attack Detection and Live Malware Analysis System for IoT Threat Intelligence
Dissecting Applications Uninstallers & Removers: Are they effective?
Representing LLVM-IR in a Code Property Graph
Why we need a theory of maliciousness: Hardware Performance Counters in security
Anatomist: Enhanced Firmware Vulnerability Discovery Based on Program State Abnormality Determination With Whole-system Replay
AI Security
AspIOC: Aspect-Enhanced Deep Neural Network for Actionable Indicator of Compromise Recognition
HeHe: Balancing the Privacy and Efficiency in Training CNNs over the Semi-honest Cloud
Deep Learning Assisted Key Recovery Attack for Round-Reduced Simeck32/64
CFL: Cluster Federated Learning in Large-scale Peer-to-Peer Networks
Bilateral Privacy-Preserving Task Assignment with Personalized Participant Selection for Mobile Crowdsensing
Communication-Efficient and Secure Federated Learning Based on Adaptive One-bit Compressed Sensing.

Browse Subjects

Show more subjects...

Statistics

from
to
Export