37 results on '"Boudguiga, Aymen"'
Search Results
2. Revisiting Stream-Cipher-Based Homomorphic Transciphering in the TFHE Era
3. Secure Attack Detection Framework for Hierarchical 6G-Enabled Internet of Vehicles
4. A Decentralized Federated Learning Using Reputation
5. Secure Data Processing for Industrial Remote Diagnosis and Maintenance
6. A Homomorphic AES Evaluation in Less than 30 Seconds by Means of TFHE
7. SigML++: Supervised Log Anomaly with Probabilistic Polynomial Approximation
8. SigML++: Supervised Log Anomaly with Probabilistic Polynomial Approximations
9. Enhancing CAN Security by Means of Lightweight Stream-Ciphers and Protocols
10. Privacy-Preserving k-means Clustering: an Application to Driving Style Recognition
11. Towards Privacy-Preserving Platooning Services by means of Homomorphic Encryption
12. Cooperative and smart attacks detection systems in 6G-enabled Internet of Things
13. A Secure Federated Learning: Analysis of Different Cryptographic Tools
14. Efficient Hybrid Model for Intrusion Detection Systems
15. Authentication in Wireless Mesh Networks
16. A Hybrid Threat Detection and Security Adaptation System for Industrial Wireless Sensor Networks
17. Privacy Preserving Services for Intelligent Transportation Systems with Homomorphic Encryption
18. Homomorphic Encryption at Work for Private Analysis of Security Logs
19. An efficient cyber defense framework for UAV-Edge computing network
20. SARA
21. Cooperative Security Framework for CBTC Network
22. A generic cyber defense scheme based on stackelberg game for vehicular network
23. Towards Better Availability and Accountability for IoT Updates by Means of a Blockchain
24. A Secure and Authenticated Key Management Protocol (SA-KMP) for Vehicular Networks
25. A simple intrusion detection method for controller area network
26. RACE: Risk analysis for cooperative engines
27. On the performance of freescale i.MX6 cryptographic acceleration and assurance module
28. Light Blind: Why Encrypt If You Can Share?
29. Pseudonymous communications in secure industrial wireless sensor networks
30. Server Assisted Key Establishment for WSN: A MIKEY-Ticket Approach
31. ID Based Cryptography for Cloud Data Storage
32. On the Use of ID-Based Cryptography for the Definition of New EAP Authentication Methods
33. An authentication scheme for IEEE 802.11s mesh networks relying on Sakai-Kasahara ID-Based Cryptographic algorithms
34. Key-escrow resistant ID-based authentication scheme for IEEE 802.11s mesh networks
35. Sécurité dans les réseaux 802.11
36. An ID-based authentication scheme for the IEEE 802.11s Mesh Network
37. Significantly improved performances of the cryptographically generated addresses thanks to ECC and GPGPU
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.