405 results on '"Kim, Kwangjo"'
Search Results
2. Attacks on Deep Learning and Their Countermeasures
3. Pros and Cons of X-Based PPDL
4. Preliminaries
5. X-Based PPDL
6. Introduction
7. Deep Feature Learning
8. Deep Learning-Based IDSs
9. Deep Learning
10. Introduction
11. Classical Machine Learning and Its Applications to IDS
12. Intrusion Detection Systems
13. A Survey on Deep Learning Techniques for Privacy-Preserving
14. Blockchain-Based Decentralized Key Management System with Quantum Resistance
15. Improving Detection of Wi-Fi Impersonation by Fully Unsupervised Deep Learning
16. Pros and Cons of X-Based PPDL
17. Privacy-Preserving Federated Learning
18. Preliminaries
19. Introduction
20. Attacks on Deep Learning and Their Countermeasures
21. X-Based PPDL
22. Privacy-Preserving Deep Learning
23. eMotion: An SGX extension for migrating enclaves
24. Detecting Impersonation Attack in WiFi Networks Using Deep Learning Approach
25. Revocable Decentralized Multi-Authority Functional Encryption
26. Summary and Further Challenges
27. A Survey on Deep Learning Techniques for Privacy-Preserving
28. Blockchain-Based Decentralized Key Management System with Quantum Resistance
29. Network Intrusion Detection using Deep Learning
30. Improving Detection of Wi-Fi Impersonation by Fully Unsupervised Deep Learning
31. Improved Impossible Differential Cryptanalysis of Rijndael and Crypton
32. An Efficient and Provably Secure Threshold Blind Signature
33. A Privacy-Preserving Secure Service Discovery Protocol for Ubiquitous Computing Environments
34. Three-Round Abuse-Free Optimistic Contract Signing with Everlasting Secrecy : (Extended Abstract)
35. Identity-Based Chameleon Hash Scheme without Key Exposure
36. Identity-based chameleon hashing and signatures without key exposure
37. Generic Security-Amplifying Methods of Ordinary Digital Signatures
38. Enhancing Security of Class I Generation 2 RFID against Traceability and Cloning
39. Detecting Impersonation Attack in WiFi Networks Using Deep Learning Approach
40. A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment
41. Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature
42. Practical Threshold Signatures Without Random Oracles
43. Mobile RFID Applications and Security Challenges
44. A Scalable and Untraceable Authentication Protocol for RFID
45. Yet Another Forward Secure Signature from Bilinear Pairings
46. Efficient Authenticated Key Agreement Protocol for Dynamic Groups
47. New ID-Based Threshold Signature Scheme from Bilinear Pairings
48. Chameleon Hashing Without Key Exposure
49. Weak Property of Malleability in NTRUSign
50. Threshold Password-Based Authentication Using Bilinear Pairings
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.