756 results on '"Li, Fagen"'
Search Results
2. A new construction of public key authenticated encryption with keyword search based on LWE
3. A sustainable certificateless authenticated searchable encryption with multi-trapdoor indistinguishability
4. A pairing-free certificateless authenticated searchable encryption with multi-trapdoor indistinguishability (MTP-IND) guarantees
5. Away from Theory: A Cloud Storage Application with Public Key Searchable Encryption Feature
6. A Pairing-Based Certificateless Authenticated Searchable Encryption with MTI Guarantees
7. Heterogeneous Aggregate Signature for Unmanned Aerial Vehicles
8. A Secure Mutual Authentication Scheme for Wireless Communication
9. Model-agnostic generation-enhanced technology for few-shot intrusion detection
10. Correction to: Bell state-based semi-quantum signature scheme with arbitrator
11. A hybrid approach for Android malware detection using improved multi-scale convolutional neural networks and residual networks
12. Blockchain-based conditional privacy-preserving authentication scheme using PUF for vehicular ad hoc networks
13. Certificateless Proxy Re-encryption with Cryptographic Reverse Firewalls for Secure Cloud Data Sharing
14. Anonymity-enhancing decentralized protocol for coin mixing based on ring signatures and key derivation
15. An efficient secure interval test protocol for small integers
16. Efficient multi-party quantum secret-sharing protocol
17. Computer vision based distributed denial of service attack detection for resource-limited devices
18. Analysis and optimization design of internal pressure resistance of flexible composite pipe
19. PCPHE: A privacy comparison protocol for vulnerability detection based on homomorphic encryption
20. A heterogeneous signcryption scheme with Cryptographic Reverse Firewalls for IoT and its application
21. A randomized encryption deduplication method against frequency attack
22. Secure quantum signature scheme without entangled state
23. Security analysis of the semi-quantum secret-sharing protocol of specific bits and its improvement
24. Bell state-based semi-quantum signature scheme with arbitrator
25. Traffic data extraction and labeling for machine learning based attack detection in IoT networks
26. Efficient public-key searchable encryption against inside keyword guessing attacks for cloud storage
27. A majority affiliation based under-sampling method for class imbalance problem
28. Signcryption-Based Encrypted Traffic Detection Scheme for Fast Establishing Secure Connections
29. HAP-SG: Heterogeneous authentication protocol for smart grid
30. Mitigation of a poisoning attack in federated learning by using historical distance detection
31. A privacy preserving federated learning scheme using homomorphic encryption and secret sharing
32. Predicting genetic response to future climate change in Eucalyptus grandis by combining genomic data with climate models
33. Determination on the fracture toughness of the welded joints of X80 pipeline steels based on small punch test
34. A blockchain-based privacy-preserving auditable authentication scheme with hierarchical access control for mobile cloud computing
35. Crystal facet-dependent product selectivity of CO2 reduction reaction on indium revealed by first-principles calculations
36. Study on the effect of loading conditions on the fracture behavior of pipeline with girth weld
37. A lightweight encrypted deduplication scheme supporting backup
38. An efficient heterogeneous authenticated key agreement scheme for unmanned aerial vehicles
39. Signcryption-Based Encrypted Traffic Detection Scheme for Fast Establishing Secure Connections
40. Certificateless Authentication and Consensus for the Blockchain-Based Smart Grid
41. Requirements for Total Resistance to Pollution Attacks in HMAC-Based Authentication Schemes for Network Coding
42. A group key agreement protocol based on ECDH and short signature
43. Security Analysis and Improvement of a Blind Semi-quantum Signature
44. A provably secure free-pairing certificateless searchable encryption scheme
45. A two rounds dynamic authenticated group key agreement protocol based on LWE
46. Determination of the true stress-strain relations of high-grade pipeline steels based on small punch test correlation method
47. Offline/Online lattice-based ciphertext policy attribute-based encryption
48. Backdoor-resistant identity-based proxy re-encryption for cloud-assisted wireless body area networks
49. A two-curve model for crack arrest prediction of high-grade pipeline based on Crack Tip Opening Angle
50. A reconstruction method to determine crack length based on virtual extensometers
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.