Search

Your search keyword '"Computer Science::Cryptography and Security"' showing total 34,146 results

Search Constraints

Start Over You searched for: Descriptor "Computer Science::Cryptography and Security" Remove constraint Descriptor: "Computer Science::Cryptography and Security"
34,146 results on '"Computer Science::Cryptography and Security"'

Search Results

1. Structured Knowledge Distillation for Dense Prediction

2. A Survey on Deep Hashing Methods

3. Security-reliability tradeoff of MIMO TAS/SC networks using harvest-to-jam cooperative jamming methods with random jammer location

4. Generalizations of leaky forcing

5. Input-Output History Feedback Controller for Encrypted Control With Leveled Fully Homomorphic Encryption

6. Privacy-Preserving Push-Sum Average Consensus Via State Decomposition

7. Error- and Tamper-Tolerant State Estimation for Discrete Event Systems under Cost Constraints

8. Secure Formation Control via Edge Computing Enabled by Fully Homomorphic Encryption and Mixed Uniform-Logarithmic Quantization

9. Nash Equilibrium Control Policy Against Bus-off Attacks in CAN Networks

10. Privacy-Utility Trade-Offs Against Limited Adversaries

11. Fast and Secure Routing Algorithms for Quantum Key Distribution Networks

12. Overparameterized Linear Regression Under Adversarial Attacks

13. Delegating signing rights in a multivariate proxy signature scheme

14. Robust Digital Image Encryption Approach Based on Extended Large-Scale Randomization Key-Stream Generator

15. State Estimation Under Joint False Data Injection Attacks: Dealing With Constraints and Insecurity

16. The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free

17. Linearization-Based Quantized Stabilization of Nonlinear Systems Under DoS Attacks

18. On the dimension and structure of the square of the dual of a Goppa code

19. Model Predictive Control as a Secure Service for Cyber–Physical Systems: A Cloud-Edge Framework

20. Worst-Case Stealthy Innovation-Based Linear Attacks on Remote State Estimation Under Kullback–Leibler Divergence

21. Green Interference Based Symbiotic Security in Integrated Satellite-Terrestrial Communications

22. Cooperative distributed state estimation: resilient topologies against smart spoofers

23. Chosen-Ciphertext Secure Homomorphic Proxy Re-Encryption

24. Adversarial vulnerability bounds for Gaussian process classification

25. Securing information using a proposed reliable chaos-based stream cipher: with real-time FPGA-based wireless connection implementation

26. Secure State Estimation With Switched Compensation Mechanism Against DoS Attacks

27. Protective Measurements and the Reality of the Wave Function

28. Secure Finite-Horizon Consensus Control of Multiagent Systems Against Cyber Attacks

29. Resilient Event-Triggered Distributed State Estimation for Nonlinear Systems Against DoS Attacks

30. Quantum Cryptanalysis on a Multivariate Cryptosystem Based on Clipped Hopfield Neural Network

31. Edge-Based Decentralized Adaptive Pinning Synchronization of Complex Networks Under Link Attacks

32. A Quantum Secure and Noninteractive Identity-Based Aggregate Signature Protocol From Lattices

33. Stealth Data Injection Attacks with Sparsity Constraints

34. An Optical Implementation of Quantum Bit Commitment Using Infinite-Dimensional Systems

35. Toward Data Transmission Security Based on Proxy Broadcast Re-encryption in Edge Collaboration

36. Compressed sensing based fingerprint imaging system using a chaotic model-based deterministic sensing matrix

37. Security-Based Resilient Robust Model Predictive Control for Polytopic Uncertain Systems Subject to Deception Attacks and RR Protocol

38. A Key-Agreement Scheme for Cyber–Physical Systems

39. Finite-Time Secure Dynamic State Estimation for Cyber–Physical Systems Under Unknown Inputs and Sensor Attacks

40. Interpreting Adversarial Examples and Robustness for Deep Learning-Based Auto-Driving Systems

41. An FPP-resistant SVD-based image watermarking scheme based on chaotic control

42. Secure Distributed Estimation Against Data Integrity Attacks in Internet-of-Things Systems

43. Resilient Model-Free Adaptive Iterative Learning Control for Nonlinear Systems Under Periodic DoS Attacks via a Fading Channel

44. HERS: Homomorphically Encrypted Representation Search

45. A New Robust Reference Image Hashing System

46. Study of Multiple Target Defense Differential Games Using Receding Horizon-Based Switching Strategies

47. KAT: A Knowledge Adversarial Training Method for Zero-Order Takagi–Sugeno–Kang Fuzzy Classifiers

48. Bounded Rationality in Byzantine Sensors Under Attacks

49. False Data Injection Attack in a Platoon of CACC: Real-Time Detection and Isolation With a PDE Approach

50. Practical Fixed-Parameter Algorithms for Defending Active Directory Style Attack Graphs

Catalog

Books, media, physical & digital resources