201
204
Akashe, Shyam
2023
Table of Contents:
“... on Quantum Blockchain based Consensus Mechanism Approaches -- A Secure and Practical Scientific Computation Outsourcing Application in Cloud Computing -- Navigating the Complexities of Cryptography: Trends, Problems and Solutions -- Real-time Suppression of Non...”2023
Full text
205
Fortino, Giancarlo
2023
Table of Contents:
“... Control in Hybrid Microgrid -- Alteration Approach for Data Cryptography Based on Grigorchuk's Group Rules to Data Mining Objective with Cloud Computing -- Review of Deep-learning based User-identification by Typing Behavior -- COMPARISON OF DIFFERENT CLOUD...”2023
Full text
206
Amsaad, Fathi
2023
Table of Contents:
“... and FCM Clustering -- Chapter 7: Hybrid Optimization using CC and PSO in Cryptography Encryption for Medical Images -- Chapter 8: Boundary Element Method for Water Wave Interaction with Semi-circular Porous Wave Barriers Placed over Stepped Seabed -- Chapter 9...”2023
Full text
207
209
Agrawal, Rajeev
2023
Table of Contents:
“...A Review of State of Art Techniques for 3D Human Activity Recognition System -- Comparative Analysis for Email Spam Detection Using Machine Learning Algorithms -- Post Quantum Cryptography: A Solution to the Challenges of Classical Encryption Algorithms...”2023
Full text
210
Hussain, Walayat
2023
Table of Contents:
“... and Its Applications to Cryptography -- A Bibliometric Analysis of Problem Structuring Between 1980 and 2019 -- An Improved Approach in Cloud-Assisted IoT Infrastructure with Anonymous Key Issuing -- Internet of Things based Digital Life to Provide Assisted...”2023
Full text
211
212
213
Lee, Roger
2023
Table of Contents:
“...symKrypt: A Lightweight Symmetric-Key Cryptography for Diverse Applications -- PK-BERT: Knowledge Enhanced Pre-trained Models with Prompt for Few-shot Learning -- Typhoon Track Prediction Based on TimeForce CNN-LSTM Hybrid Model -- The Novel...”2023
Full text
214
Zolfaghari, Behrouz
2023
Table of Contents:
“...Introduction -- The Cross-Impact between Cryptography and Artificial Intelligence -- II Past: War and Peace -- The Dichotomy of Crypto and NN -- III Present: Coevolution -- AI Makes Crypto Evolve -- Crypto Makes AI Evolve -- IV From a Dichotomy to a...”2023
Full text
215
Cebi, Selcuk
2023
Table of Contents:
“... -- Cryptography Based on Fuzzy Graphs -- Aggregating distances with uncertainty: the modular (pseudo-)metric case -- Peterson's Rules based on Grades for Fuzzy Logical Syllogisms -- A new construction of uninorms in bounded lattices derivedfrom t-normsand t-conorms...”2023
Full text
216
217
Table of Contents:
“...Introduction to Nature Inspired Algorithms -- Cryptography Background and Primitives -- Genetic Cryptography -- Neural Cryptography -- DNA based Cryptography -- Optimization of Cryptosystems using Nature Inspired Algorithms -- Bio-inspired Lightweight...”
Full text
Full text
218
Batina, Lejla
2022
Table of Contents:
“...AI for Cryptography -- Artificial Intelligence for the Design of Symmetric Cryptographic Primitives -- Traditional Machine Learning Methods for Side-Channel Analysis -- Deep Learning on Side-Channel Analysis -- Artificial Neural Networks and Fault...”2022
Full text
219
220