Search

Showing total 13 results

Search Constraints

Start Over You searched for: Search Limiters Available in Library Collection Remove constraint Search Limiters: Available in Library Collection Topic computer science Remove constraint Topic: computer science Publication Year Range Last 3 years Remove constraint Publication Year Range: Last 3 years Journal journal of information security & applications Remove constraint Journal: journal of information security & applications
13 results

Search Results

1. Verifiable quaternion fully homomorphic encryption scheme for mitigating false data injection attacks by privacy preservation in fog environment.

2. Improved differential attacks on the reduced-round SNOW-V and SNOW-Vi stream cipher.

3. Constructions of non-basic totally disjoint spectra plateaued functions for cryptographic applications.

4. A modified secure hash design to circumvent collision and length extension attacks.

5. An end-to-end method for advanced persistent threats reconstruction in large-scale networks based on alert and log correlation.

6. Secure word-level sorting based on fully homomorphic encryption.

7. Practical dynamic group signature with efficient concurrent joins and batch verifications.

8. Lightweight capability-token for consent-based authentication protocol for smart sensor nodes.

9. Function-level obfuscation detection method based on Graph Convolutional Networks.

10. An improved convolution Merkle tree-based blockchain electronic medical record secure storage scheme.

11. Neural networks based domain name generation.

12. Intragroup and intergroup secret image sharing based on homomorphic Lagrange interpolation.

13. A novel wide & deep transfer learning stacked GRU framework for network intrusion detection.