Search

Showing total 17 results

Search Constraints

Start Over You searched for: Search Limiters Academic (Peer-Reviewed) Journals Remove constraint Search Limiters: Academic (Peer-Reviewed) Journals Topic computer science Remove constraint Topic: computer science Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years Journal journal of information security & applications Remove constraint Journal: journal of information security & applications Publisher elsevier b.v. Remove constraint Publisher: elsevier b.v.
17 results

Search Results

1. Lightweight scheme of secure outsourcing SVD of a large matrix on cloud.

2. Verifiable quaternion fully homomorphic encryption scheme for mitigating false data injection attacks by privacy preservation in fog environment.

3. Improved differential attacks on the reduced-round SNOW-V and SNOW-Vi stream cipher.

4. Constructions of non-basic totally disjoint spectra plateaued functions for cryptographic applications.

5. A modified secure hash design to circumvent collision and length extension attacks.

6. An end-to-end method for advanced persistent threats reconstruction in large-scale networks based on alert and log correlation.

7. Secure word-level sorting based on fully homomorphic encryption.

8. Lightweight capability-token for consent-based authentication protocol for smart sensor nodes.

9. Practical dynamic group signature with efficient concurrent joins and batch verifications.

10. Function-level obfuscation detection method based on Graph Convolutional Networks.

11. Neural networks based domain name generation.

12. An improved convolution Merkle tree-based blockchain electronic medical record secure storage scheme.

13. Intragroup and intergroup secret image sharing based on homomorphic Lagrange interpolation.

14. A novel wide & deep transfer learning stacked GRU framework for network intrusion detection.

15. A hybrid scheme for enhancing recovered image quality in polynomial based secret image sharing by modify-and-recalculate strategy.

16. Steganography over Redundant Residue Number System Codes.

17. ESEAP: ECC based secure and efficient mutual authentication protocol using smart card.