Linked e-resources

Details

Cryptography I
Plaintext-Checkable Encryption with Unlink-CCA Security in the Standard Model
A Bitwise Logistic Regression using Binary Approximation and Real Number Division in Homomorphic Encryption Scheme
Accelerating Number Theoretic Transform in GPU Platform for qTESLA Scheme
Provably Secure Three-party Password-based Authenticated Key Exchange from RLWE
System and Network Security
KMO : Kernel Memory Observer to Identify Memory Corruption by Secret Inspection Mechanism
Peel the onion: Recognition of Android apps behind the Tor Network
JSLess: A Tale of a Fileless Javascript Memory-Resident Malware
Security Protocol and Tool
A Physical ZKP for Slitherlink: How to Perform Physical Topology-Preserving Computation
Secure Best Arm Identification in Multi-Armed Bandits
CATCHA: When Cats Track Your Movements Online
Designing a Code Vulnerability Meta-Scanner
Access Control and Authentication
Using IFTTT to Express and Enforce UCON Obligations
Evaluation of Software PUF Based on Gyroscope
White-Box Implementation of the KMAC Message Authentication Code
Cryptography II
Improving Signature Schemes With Tight Security Reductions
Improved Digital Signatures Based on Elliptic Curve Endomorphism Rings
Identity-based Signature Scheme Secure in Ephemeral Setup and Leakage Scenarios
Recovering Internal States of Grain-v1
Data and User Privacy
GDPR-Compliant Reputation System Based on Self-Certifying Domain Signatures
Defining a new composite cybersecurity rating scheme for SMEs in the U.K.
Privacy Preserving Approach in Dynamic Social Network Data Publishing
Short Paper I
Using Freivalds algorithm to accelerate Lattice-Based Signature Verifications
Group-based Key Exchange Protocol based on Complete Decomposition Search Problem
Development Activities, Tools and Techniques of Secure Microservices Compositions
Generating Phishing Emails Using Graph Database
Short Paper II
Eva luating Intrusion Sensitivity Allocation with Support Vector Machine for Collaborative Intrusion Detection
The (Persistent) Threat of Weak Passwords: Implementation of a Semi-Automatic Password-Cracking Algorithm
A Novel and Comprehensive Evaluation Methodology for SIEM.

Browse Subjects

Show more subjects...

Statistics

from
to
Export