Search

Showing total 1,541 results

Search Constraints

Start Over You searched for: Journal computer journal Remove constraint Journal: computer journal
1,541 results

Search Results

51. A White-box Implementation of SM4 with Self-equivalence Encoding.

52. Resilient Vector Consensus Over Random Dynamic Networks Under Mobile Malicious Attacks.

53. How To Bind A TPM's Attestation Keys With Its Endorsement Key.

54. Wearable Sensor-Based Human Activity Recognition System Employing Bi-LSTM Algorithm.

55. An Efficient Pending Interest Table Content Search In NDN through Stable Bloom Filter.

56. An e-Coin Based Construction for Unlinkable Priced Oblivious Transfer.

57. A General Condition of Structural Distinguisher.

58. Balanced Off-Chain Payment Channel Network Routing Strategy Based On Weight Calculation.

59. Cryptanalysis of Reduced-Round SipHash.

60. CD-BCM:Cross-Domain Batch Certificates Management Based On Blockchain.

61. Automating the Deployment of Cyber Range with OpenStack.

62. Extremely Lightweight Constant-Round Membership-Authenticated Group Key Establishment for Resource-Constrained Smart Environments toward 5G.

63. Worst-Case Analysis of Heapsort, Exactly.

64. A New Fuzzy Smoothing Term Model For Stereo Matching.

65. Mobility and Security Aware Real-Time Task Scheduling in Fog-Cloud Computing for IoT Devices: A Fuzzy-Logic Approach.

66. Finding Influencers in Complex Networks: An Effective Deep Reinforcement Learning Approach.

67. Compressed Zero-Knowledge Proofs for Lattice-Based Accumulator.

68. Reliability Evaluation Of Multiprocessor System Based On The Balanced Complete Multipartite Graphs.

69. Explicit Upper Bound Of Impossible Differentials For AES-Like Ciphers: Application To uBlock And Midori.

70. Providing an Approach for Early Prediction of Fall in Human Activities Based on Wearable Sensor Data and the Use of Deep Learning Algorithms.

71. Certificateless Broadcast Encryption with Authorization Suitable for Storing Personal Health Records.

72. Hitting Times of Random Walks on Edge Corona Product Graphs.

73. Improved (Related-Key) Differential-Based Neural Distinguishers for SIMON and SIMECK Block Ciphers.

74. Structure Fault Tolerance of Exchanged Hypercube.

75. Removing Watermarks For Image Processing Networks Via Referenced Subspace Attention.

76. Query Operators for Transactional Data: Detecting Similar and Periodic Transactions.

77. CSEA: A Fine-Grained Framework of Climate-Season-Based Energy-Aware in Cloud Storage Systems.

78. Perceptual Image Hashing Based on Canny Operator and Tensor for Copy-Move Forgery Detection.

79. Comparative Analysis of Overlap Community Detection Techniques on Social Media Platform.

80. State-Optimal Alternator for Uniform Synchronous Rings1Some of the results in this paper were published at the 19th International Conference on Advanced Information Networking and Applications, pp. 847–852, 2005.

81. Locating Maximal Multirepeats in Multiple Strings Under Various Constraints†A preliminary version of the results of this paper was presented in CPM 2002.

82. Learning Disjunctive Multiplicity Expressions and Disjunctive Generalize Multiplicity Expressions From Both Positive and Negative Examples.

83. Social Media Analysis of Customer Emotions in Pizza Industry.

84. The Need for Being Explicit: Failed Attempts to Construct Implicit Certificates from Lattices.

85. A Self-Stabilizing Distributed Algorithm for the Generalized Dominating Set Problem With Safe Convergence.

86. Two-Party Signing For ISO/IEC Digital Signature Standards.

87. Laser Beam Welded Aluminum-Titanium Dissimilar Sheet Metals: Neural Network Based Strength and Hardness Prediction Model.

88. Two-Dimensional Block Trees.

89. Encoding with Combination Orientation Technique for RDH in Dual Stego Images.

90. Key Reuse Attacks on Post-quantum Cryptosystems, Revisited.

91. User Name-Based Compression and Encryption of Images Using Chaotic Compressive Sensing Theory.

92. A New Method for Identifying Influential Spreaders in Complex Networks.

93. Quantum Guess and Determine Attack on Stream Ciphers.

94. SeqMask: Behavior Extraction Over Cyber Threat Intelligence Via Multi-Instance Learning.

95. A Hybrid-Convolution Spatial–Temporal Recurrent Network For Traffic Flow Prediction.

96. Key Node Identification Method Integrating Information Transmission Probability and Path Diversity in Complex Network.

97. A System For Storing Anonymous Patient Healthcare Data Using Blockchain And Its Applications.

98. Differential Attack With Constants On μ2 Block Cipher.

99. An Attack on a Proposed Construction of Small-State Stream Ciphers and Proposals for New Constructions.

100. PNCTS: A Prediction and Network Coding-Based Transmission Scheme for Efficient Screen Updates Delivery in DaaS.