1
Lu, Rongxing
2024
Table of Contents:
“... -- Cryptography and Encryption Techniques -- Heterogeneous Aggregate Signature for Unmanned Aerial Vehicles -- Secure arbitrated quantum signature scheme with Bell state -- An Authorized Function Homomorphic Proxy Signature Scheme with Sampling Batch Verification...”2024
Full text
2
3
4
Abou el Kalam, Anas
2024
Table of Contents:
“... of Alzheimer's Disease using Deep Learning: A Comprehensive Analysis -- Pattern Recognition in Blockchain, IOT, Cyber Plus Network Security, and Cryptography -- VAIDS: A Hybrid Deep Learning Model to Detect Intrusions in MQTT Protocol Enabled Networks -- Crypto Bank...”2024
Full text
5
6
7
Table of Contents:
“... System -- A Systematic Method for Constructing ICT Supply Chain Security Requirements -- Pairing Compression on Some Elliptic Curves with Subgroups of Embedding Degree 6 and its Applications to Pairing-based Cryptography -- Enhancing Chinese Named Entity...”
Full text
Full text
8
Gupta, Nishu
2024
Table of Contents:
“... Dictionary -- Creating a Protected Virtual Learning Space: A Comprehensive Strategy for Security and User Experience in Online Education -- LIGHTWEIGHT CRYPTOGRAPHY MODEL FOR OVERHEAD AND DELAY REDUCTION IN THE NETWORK -- Modelling the Data Object Routing in Data...”2024
Full text
9
Bhasin, Shivam
2024
Table of Contents:
“...Symmetric-key cryptography, Hash functions, Authenticated Encryption Modes -- Multimixer-156: Universal Keyed Hashing Based on Integer Multiplication and cyclic shift -- On the Security of Triplex- and Multiplex-type Constructions with Smaller Tweak Size...”2024
Full text
10
Bhasin, Shivam
2024
Table of Contents:
“... Functions -- Distributed Protocols for Oblivious Transfer and Polynomial Evaluation -- Obfuscating Decision Trees -- Privacy-Preserving Plagiarism Checking -- PURED: A unified framework for resource-hard functions -- Post-quantum cryptography -- Implementing...”2024
Full text
11
12
Aziz, Ahmed
2023
Table of Contents:
“... as the money of the future -- A Data Security Technique Combining Asymmetric Cryptography and Compressive Sensing for IoT Enabled Wireless Sensor Networks -- Energy Efficient and Secure Scheme based Compressive Sensing method for Internet of Vehicles -- Impact...”2023
Full text
13
Ghosh, Ankush
2023
Table of Contents:
“... Tamil Song Lyrics using Machine Learning Algorithms -- AI Based Interactive System-HOMIE -- Factors Influencing Security Issues in Cloud Computing -- Code-Based Cryptography: A Comparative Study of Key Sizes -- Advance Collision Prevention System -- Energy...”2023
Full text
14
15
Quan, Wei
2023
Table of Contents:
“... Tamil Song Lyrics using Machine Learning Algorithms -- AI Based Interactive System-HOMIE -- Factors Influencing Security Issues in Cloud Computing -- Code-Based Cryptography: A Comparative Study of Key Sizes -- Advance Collision Prevention System -- Energy...”2023
Full text
16
17
Table of Contents:
“... without Asymmetric Cryptography in the Internet-of-Things -- A-VMD: Adaptive Variational Mode Decomposition Scheme for Noise Reduction in Sensor-Cloud -- A Thermal-Aware Scheduling Algorithm for Reducing Thermal Risks in DAG-based Applications in Cyber-Physical...”
Full text
Full text
18
Table of Contents:
“... applications -- Low Light image Illumination Adjustment using Fusion of MIRNet and Deep Illumination Curves -- A HYBRID INTELLIGENT CRYPTOGRAPHY ALGORITHM FOR DISTRIBUTED BIG DATA STORAGE IN CLOUD COMPUTING SECURITY -- An Ensemble Technique to Detect Stress...”
Full text
Full text
19
20
Angin, Pelin
2023
Table of Contents:
“... -- Recent Challenges in a New Distributed Learning Paradigm -- Cryptography and Data Security -- Theoretical and Deep Learning Based Analysis of Biases in Salsa 128 bits -- Blind Decryption and Private Information Delivery -- Using Machine Learning for Detecting...”2023
Full text