1
Frontiers in Cyber Security [E-Book] : 6th International Conference, FCS 2023, Chengdu, China, August 21-23, 2023, Revised Selected Papers /
Table of Contents: ... -- Cryptography and Encryption Techniques -- Heterogeneous Aggregate Signature for Unmanned Aerial Vehicles -- Secure arbitrated quantum signature scheme with Bell state -- An Authorized Function Homomorphic Proxy Signature Scheme with Sampling Batch Verification...

Full text 
2
Emerging Information Security and Applications [E-Book] : 4th International Conference, EISA 2023, Hangzhou, China, December 6-7, 2023, Proceedings /
Table of Contents: ... System -- A Systematic Method for Constructing ICT Supply Chain Security Requirements -- Pairing Compression on Some Elliptic Curves with Subgroups of Embedding Degree 6 and its Applications to Pairing-based Cryptography -- Enhancing Chinese Named Entity...

Full text 
3
Advanced Communication and Intelligent Systems [E-Book] : First International Conference, ICACIS 2022, Virtual Event, October 20-21, 2022, Revised Selected Papers /
Table of Contents: ... Tamil Song Lyrics using Machine Learning Algorithms -- AI Based Interactive System-HOMIE -- Factors Influencing Security Issues in Cloud Computing -- Code-Based Cryptography: A Comparative Study of Key Sizes -- Advance Collision Prevention System -- Energy...

Full text 
4
Intelligent Computing and Networking [E-Book] : Proceedings of IC-ICN 2022 /
5
Emerging Networking Architecture and Technologies [E-Book] : First International Conference, ICENAT 2022, Shenzhen, China, November 15-17, 2022, Proceedings /
Quan, Wei
2023
Table of Contents: ... Tamil Song Lyrics using Machine Learning Algorithms -- AI Based Interactive System-HOMIE -- Factors Influencing Security Issues in Cloud Computing -- Code-Based Cryptography: A Comparative Study of Key Sizes -- Advance Collision Prevention System -- Energy...

Full text 
6
Ubiquitous Security [E-Book] : Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28-31, 2022, Revised Selected Papers /
Table of Contents: ... without Asymmetric Cryptography in the Internet-of-Things -- A-VMD: Adaptive Variational Mode Decomposition Scheme for Noise Reduction in Sensor-Cloud -- A Thermal-Aware Scheduling Algorithm for Reducing Thermal Risks in DAG-based Applications in Cyber-Physical...

Full text 
7
Mobile Internet Security [E-Book] : 6th International Symposium, MobiSec 2022, Jeju, South Korea, December 15-17, 2022, Revised Selected Papers /
Table of Contents: ... -- Recent Challenges in a New Distributed Learning Paradigm -- Cryptography and Data Security -- Theoretical and Deep Learning Based Analysis of Biases in Salsa 128 bits -- Blind Decryption and Private Information Delivery -- Using Machine Learning for Detecting...

Full text 
8
Computing Science, Communication and Security [E-Book] : 4th International Conference, COMS2 2023, Mehsana, Gujarat, India, February 6-7, 2023, Revised Selected Papers /
Table of Contents: ... of cryptography -- Gaussian Mixture Model-Based Clustering for Energy Saving in WSN -- Physical Layer Security Optimisation for NOMA-based UAV communication for Optimal Resource Allocation -- DBFEH: Design of a Deep-learning-based Bioinspired model to improve Feature...

Full text 
9
Smart Trends in Computing and Communications [E-Book] : Proceedings of SmartCom 2022 /
Table of Contents: ... 9. Potential Applications of Advanced Control System Strategies in A Process Industry - A Review -- Chapter 10. Analysis of Algorithms For Effective Cryptography for Enhancement Of IoT Security -- Chapter 11. Relevance of Artificial Intelligence...

Full text 
10
Advances in Computational Intelligence [E-Book] : 21st Mexican International Conference on Artificial Intelligence, MICAI 2022, Monterrey, Mexico, October 24-29, 2022, Proceedings, Part II /
Table of Contents: ...-Based Search (CBS) and Focal Search (FS) -- Studying Special Operators for the Application of Evolutionary Algorithms in the Search of Optimal Boolean Functions for Cryptography -- Unification of Source-Code Re-use Similarity Measures -- Considerations...

Full text 
11
Frontiers in Cyber Security [E-Book] : 5th International Conference, FCS 2022, Kumasi, Ghana, December 13-15, 2022, Proceedings /
Table of Contents: ... -- A Gas Cost Analytical Approach based on Certificateless Key Encapsulation Protocol for Medicalized blockchains -- Cryptography -- A Universal Lightweight Privacy-Preserving Multifunctional Data Handling Scheme -- New Trapdoor and Preimage Sampling on NTRU...

Full text 
12
Data Privacy Management, Cryptocurrencies and Blockchain Technology [E-Book] : ESORICS 2021 International Workshops, DPM 2021 and CBT 2021, Darmstadt, Germany, October 8, 2021, Revised Selected Papers /
13
Emerging Information Security and Applications [E-Book] : Third International Conference, EISA 2022, Wuhan, China, October 29-30, 2022, Proceedings /
Table of Contents: ...Asymmetric Secure Multi-Party Signing Protocol for the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography -- A Multi-Task Mobile Crowdsensing Scheme with Conditional Privacy Preserving for Vehicle Networks -- Towards...

Full text 
14
Frontiers in Cyber Security [E-Book] : 4th International Conference, FCS 2021, Haikou, China, December 17-19, 2021, Revised Selected Papers /
15
Distributed Computing for Emerging Smart Networks [E-Book] : Third International Workshop, DiCES-N 2022, Bizerte, Tunisia, February 11, 2022, Proceedings /
16
Cyber Security [E-Book] : 18th China Annual Conference, CNCERT 2021, Beijing, China, July 20-21, 2021, Revised Selected Papers /
17
Mobile Internet Security [E-Book] : 5th International Symposium, MobiSec 2021, Jeju Island, South Korea, October 7-9, 2021, Revised Selected Papers /
Table of Contents: ...IoT and Cyber Security -- Blockchain Security -- Digital Forensic and Malware Analysis -- 5G Virtual Infrastructure, Cryptography and Network Security....

Full text 
18
Secure Knowledge Management In The Artificial Intelligence Era [E-Book] : 9th International Conference, SKM 2021, San Antonio, TX, USA, October 8-9, 2021, Proceedings /
19
New Trends in Computer Technologies and Applications [E-Book] : 25th International Computer Symposium, ICS 2022, Taoyuan, Taiwan, December 15-17, 2022, Proceedings /
Table of Contents: ... -- Vision-Based Lightweight Facial Respiration and Heart Rate Measurement Technology -- GAN-based Criminal Suspect Face Generator -- Cryptography and Information Security -- Automatic Summarization of Critial Threat Intelligence Using Transfer Learning -- Anti...

Full text 
20
Artificial Intelligence and Security [E-Book] : 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part II /