1
Lu, Rongxing
2024
Table of Contents:
“... -- Cryptography and Encryption Techniques -- Heterogeneous Aggregate Signature for Unmanned Aerial Vehicles -- Secure arbitrated quantum signature scheme with Bell state -- An Authorized Function Homomorphic Proxy Signature Scheme with Sampling Batch Verification...”2024
Full text
2
Table of Contents:
“... System -- A Systematic Method for Constructing ICT Supply Chain Security Requirements -- Pairing Compression on Some Elliptic Curves with Subgroups of Embedding Degree 6 and its Applications to Pairing-based Cryptography -- Enhancing Chinese Named Entity...”
Full text
Full text
3
Ghosh, Ankush
2023
Table of Contents:
“... Tamil Song Lyrics using Machine Learning Algorithms -- AI Based Interactive System-HOMIE -- Factors Influencing Security Issues in Cloud Computing -- Code-Based Cryptography: A Comparative Study of Key Sizes -- Advance Collision Prevention System -- Energy...”2023
Full text
4
5
Quan, Wei
2023
Table of Contents:
“... Tamil Song Lyrics using Machine Learning Algorithms -- AI Based Interactive System-HOMIE -- Factors Influencing Security Issues in Cloud Computing -- Code-Based Cryptography: A Comparative Study of Key Sizes -- Advance Collision Prevention System -- Energy...”2023
Full text
6
Table of Contents:
“... without Asymmetric Cryptography in the Internet-of-Things -- A-VMD: Adaptive Variational Mode Decomposition Scheme for Noise Reduction in Sensor-Cloud -- A Thermal-Aware Scheduling Algorithm for Reducing Thermal Risks in DAG-based Applications in Cyber-Physical...”
Full text
Full text
7
Angin, Pelin
2023
Table of Contents:
“... -- Recent Challenges in a New Distributed Learning Paradigm -- Cryptography and Data Security -- Theoretical and Deep Learning Based Analysis of Biases in Salsa 128 bits -- Blind Decryption and Private Information Delivery -- Using Machine Learning for Detecting...”2023
Full text
8
Amin, Kiran
2023
Table of Contents:
“... of cryptography -- Gaussian Mixture Model-Based Clustering for Energy Saving in WSN -- Physical Layer Security Optimisation for NOMA-based UAV communication for Optimal Resource Allocation -- DBFEH: Design of a Deep-learning-based Bioinspired model to improve Feature...”2023
Full text
9
Joshi, Amit
2023
Table of Contents:
“... 9. Potential Applications of Advanced Control System Strategies in A Process Industry - A Review -- Chapter 10. Analysis of Algorithms For Effective Cryptography for Enhancement Of IoT Security -- Chapter 11. Relevance of Artificial Intelligence...”2023
Full text
10
Table of Contents:
“...-Based Search (CBS) and Focal Search (FS) -- Studying Special Operators for the Application of Evolutionary Algorithms in the Search of Optimal Boolean Functions for Cryptography -- Unification of Source-Code Re-use Similarity Measures -- Considerations...”
Full text
Full text
11
Ahene, Emmanuel
2022
Table of Contents:
“... -- A Gas Cost Analytical Approach based on Certificateless Key Encapsulation Protocol for Medicalized blockchains -- Cryptography -- A Universal Lightweight Privacy-Preserving Multifunctional Data Handling Scheme -- New Trapdoor and Preimage Sampling on NTRU...”2022
Full text
12
13
Chen, Jiageng
2022
Table of Contents:
“...Asymmetric Secure Multi-Party Signing Protocol for the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography -- A Multi-Task Mobile Crowdsensing Scheme with Conditional Privacy Preserving for Vehicle Networks -- Towards...”2022
Full text
14
15
17
Kim, Hwankuk
2022
Table of Contents:
“...IoT and Cyber Security -- Blockchain Security -- Digital Forensic and Malware Analysis -- 5G Virtual Infrastructure, Cryptography and Network Security....”2022
Full text
18
19
Hsieh, Sun-Yuan
2022
Table of Contents:
“... -- Vision-Based Lightweight Facial Respiration and Heart Rate Measurement Technology -- GAN-based Criminal Suspect Face Generator -- Cryptography and Information Security -- Automatic Summarization of Critial Threat Intelligence Using Transfer Learning -- Anti...”2022
Full text
20