1
Table of Contents:
“... System -- A Systematic Method for Constructing ICT Supply Chain Security Requirements -- Pairing Compression on Some Elliptic Curves with Subgroups of Embedding Degree 6 and its Applications to Pairing-based Cryptography -- Enhancing Chinese Named Entity...”
Full text
Full text
2
Bhasin, Shivam
2024
Table of Contents:
“... Functions -- Distributed Protocols for Oblivious Transfer and Polynomial Evaluation -- Obfuscating Decision Trees -- Privacy-Preserving Plagiarism Checking -- PURED: A unified framework for resource-hard functions -- Post-quantum cryptography -- Implementing...”2024
Full text
3
Lu, Rongxing
2024
Table of Contents:
“... -- Cryptography and Encryption Techniques -- Heterogeneous Aggregate Signature for Unmanned Aerial Vehicles -- Secure arbitrated quantum signature scheme with Bell state -- An Authorized Function Homomorphic Proxy Signature Scheme with Sampling Batch Verification...”2024
Full text
4
Gupta, Nishu
2024
Table of Contents:
“... Dictionary -- Creating a Protected Virtual Learning Space: A Comprehensive Strategy for Security and User Experience in Online Education -- LIGHTWEIGHT CRYPTOGRAPHY MODEL FOR OVERHEAD AND DELAY REDUCTION IN THE NETWORK -- Modelling the Data Object Routing in Data...”2024
Full text
5
Abou el Kalam, Anas
2024
Table of Contents:
“... of Alzheimer's Disease using Deep Learning: A Comprehensive Analysis -- Pattern Recognition in Blockchain, IOT, Cyber Plus Network Security, and Cryptography -- VAIDS: A Hybrid Deep Learning Model to Detect Intrusions in MQTT Protocol Enabled Networks -- Crypto Bank...”2024
Full text
6
7
8
9
10
Bhasin, Shivam
2024
Table of Contents:
“...Symmetric-key cryptography, Hash functions, Authenticated Encryption Modes -- Multimixer-156: Universal Keyed Hashing Based on Integer Multiplication and cyclic shift -- On the Security of Triplex- and Multiplex-type Constructions with Smaller Tweak Size...”2024
Full text
11
12
13
Aziz, Ahmed
2023
Table of Contents:
“... as the money of the future -- A Data Security Technique Combining Asymmetric Cryptography and Compressive Sensing for IoT Enabled Wireless Sensor Networks -- Energy Efficient and Secure Scheme based Compressive Sensing method for Internet of Vehicles -- Impact...”2023
Full text
14
Amin, Kiran
2023
Table of Contents:
“... of cryptography -- Gaussian Mixture Model-Based Clustering for Energy Saving in WSN -- Physical Layer Security Optimisation for NOMA-based UAV communication for Optimal Resource Allocation -- DBFEH: Design of a Deep-learning-based Bioinspired model to improve Feature...”2023
Full text
15
Cui, Ningning
2023
Table of Contents:
“... Model -- Spatial Commonsense Reasoning for Machine Reading Comprehension -- Multimodal learning for Automatic Summarization: A Survey -- Deep Knowledge Tracing with Concept Trees -- Privacy and Security -- Cryptography-Inspired Federated Learning...”2023
Full text
16
Joshi, Amit
2023
Table of Contents:
“... 9. Potential Applications of Advanced Control System Strategies in A Process Industry - A Review -- Chapter 10. Analysis of Algorithms For Effective Cryptography for Enhancement Of IoT Security -- Chapter 11. Relevance of Artificial Intelligence...”2023
Full text
17
18
Table of Contents:
“... applications -- Low Light image Illumination Adjustment using Fusion of MIRNet and Deep Illumination Curves -- A HYBRID INTELLIGENT CRYPTOGRAPHY ALGORITHM FOR DISTRIBUTED BIG DATA STORAGE IN CLOUD COMPUTING SECURITY -- An Ensemble Technique to Detect Stress...”
Full text
Full text
19
20
Angin, Pelin
2023
Table of Contents:
“... -- Recent Challenges in a New Distributed Learning Paradigm -- Cryptography and Data Security -- Theoretical and Deep Learning Based Analysis of Biases in Salsa 128 bits -- Blind Decryption and Private Information Delivery -- Using Machine Learning for Detecting...”2023
Full text