72 results on '"Boudguiga, Aymen"'
Search Results
2. ComBo: A Novel Functional Bootstrapping Method for Efficient Evaluation of Nonlinear Functions in the Encrypted Domain
3. Optimized Stream-Cipher-Based Transciphering by Means of Functional-Bootstrapping
4. Building Blocks for LSTM Homomorphic Evaluation with TFHE
5. SigML: Supervised Log Anomaly with Fully Homomorphic Encryption
6. Building Blocks for LSTM Homomorphic Evaluation with TFHE
7. Revisiting Stream-Cipher-Based Homomorphic Transciphering in the TFHE Era
8. A Secure and Authenticated Key Management Protocol (SA-KMP) for Vehicular Networks
9. Secure Data Processing for Industrial Remote Diagnosis and Maintenance
10. Revisiting Stream-Cipher-Based Homomorphic Transciphering in the TFHE Era
11. Privacy-Preserving k-means Clustering: an Application to Driving Style Recognition
12. Enhancing CAN Security by Means of Lightweight Stream-Ciphers and Protocols
13. Secure Attack Detection Framework for Hierarchical 6G-Enabled Internet of Vehicles
14. A Decentralized Federated Learning Using Reputation
15. An efficient cyber defense framework for UAV-Edge computing network
16. A Homomorphic AES Evaluation in Less than 30 Seconds by Means of TFHE
17. SigML++: Supervised Log Anomaly with Probabilistic Polynomial Approximation
18. Privacy-Preserving k-means Clustering: an Application to Driving Style Recognition
19. Practical Multi-Key Homomorphic Encryption for More Flexible and Efficient Secure Federated Average Aggregation
20. A Hybrid Threat Detection and Security Adaptation System for Industrial Wireless Sensor Networks
21. Towards Privacy-Preserving Platooning Services by means of Homomorphic Encryption
22. Cooperative and smart attacks detection systems in 6G-enabled Internet of Things
23. A Secure Federated Learning: Analysis of Different Cryptographic Tools
24. Efficient Hybrid Model for Intrusion Detection Systems
25. Authentication in Wireless Mesh Networks
26. A Hybrid Threat Detection and Security Adaptation System for Industrial Wireless Sensor Networks
27. Privacy Preserving Services for Intelligent Transportation Systems with Homomorphic Encryption
28. Homomorphic Encryption at Work for Private Analysis of Security Logs
29. SARA
30. SODA-IIoT4ConnectedCars: Spread updates between cars with limited Internet access
31. SARA
32. Cooperative Security Framework for CBTC Network
33. A generic cyber defense scheme based on stackelberg game for vehicular network
34. Light Blind: Why Encrypt If You Can Partition?
35. Xvisor VirtIO-CAN: Fast Virtualized CAN
36. Cooperative-ITS Architecture and Security Challenges: a Survey
37. Towards Better Availability and Accountability for IoT Updates by Means of a Blockchain
38. A Secure and Authenticated Key Management Protocol (SA-KMP) for Vehicular Networks
39. Fundamentals of identity-based cryptography
40. A simple intrusion detection method for controller area network
41. ID based cryptography for secure cloud data storage
42. RACE: Risk analysis for cooperative engines
43. On the performance of freescale i.MX6 cryptographic acceleration and assurance module
44. Light Blind: Why Encrypt If You Can Share?
45. Pseudonymous communications in secure industrial wireless sensor networks
46. Server Assisted Key Establishment for WSN: A MIKEY-Ticket Approach
47. ID Based Cryptography for Cloud Data Storage
48. On the Use of ID-Based Cryptography for the Definition of New EAP Authentication Methods
49. An authentication scheme for IEEE 802.11s mesh networks relying on Sakai-Kasahara ID-Based Cryptographic algorithms
50. Key-escrow resistant ID-based authentication scheme for IEEE 802.11s mesh networks
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.