1
Frontiers in Cyber Security [E-Book] : 6th International Conference, FCS 2023, Chengdu, China, August 21-23, 2023, Revised Selected Papers /
Table of Contents: ... -- Cryptography and Encryption Techniques -- Heterogeneous Aggregate Signature for Unmanned Aerial Vehicles -- Secure arbitrated quantum signature scheme with Bell state -- An Authorized Function Homomorphic Proxy Signature Scheme with Sampling Batch Verification...

Full text 
2
Emerging Information Security and Applications [E-Book] : 4th International Conference, EISA 2023, Hangzhou, China, December 6-7, 2023, Proceedings /
Table of Contents: ... System -- A Systematic Method for Constructing ICT Supply Chain Security Requirements -- Pairing Compression on Some Elliptic Curves with Subgroups of Embedding Degree 6 and its Applications to Pairing-based Cryptography -- Enhancing Chinese Named Entity...

Full text 
3
Artificial Intelligence Security and Privacy [E-Book] : First International Conference on Artificial Intelligence Security and Privacy, AIS&P 2023, Guangzhou, China, December 3-5, 2023, Proceedings, Part I /
4
Artificial Intelligence Security and Privacy [E-Book] : First International Conference on Artificial Intelligence Security and Privacy, AIS&P 2023, Guangzhou, China, December 3-5, 2023, Proceedings, Part II /
5
Data Privacy Management, Cryptocurrencies and Blockchain Technology [E-Book] : ESORICS 2022 International Workshops, DPM 2022 and CBT 2022, Copenhagen, Denmark, September 26-30, 2022, Revised Selected Papers /
6
Electronic Voting [E-Book] : 8th International Joint Conference, E-Vote-ID 2023, Luxembourg City, Luxembourg, October 3-6, 2023, Proceedings /
7
Advanced Communication and Intelligent Systems [E-Book] : First International Conference, ICACIS 2022, Virtual Event, October 20-21, 2022, Revised Selected Papers /
Table of Contents: ... Tamil Song Lyrics using Machine Learning Algorithms -- AI Based Interactive System-HOMIE -- Factors Influencing Security Issues in Cloud Computing -- Code-Based Cryptography: A Comparative Study of Key Sizes -- Advance Collision Prevention System -- Energy...

Full text 
8
Ubiquitous Security [E-Book] : Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28-31, 2022, Revised Selected Papers /
Table of Contents: ... without Asymmetric Cryptography in the Internet-of-Things -- A-VMD: Adaptive Variational Mode Decomposition Scheme for Noise Reduction in Sensor-Cloud -- A Thermal-Aware Scheduling Algorithm for Reducing Thermal Risks in DAG-based Applications in Cyber-Physical...

Full text 
9
Emerging Networking Architecture and Technologies [E-Book] : First International Conference, ICENAT 2022, Shenzhen, China, November 15-17, 2022, Proceedings /
Quan, Wei
2023
Table of Contents: ... Tamil Song Lyrics using Machine Learning Algorithms -- AI Based Interactive System-HOMIE -- Factors Influencing Security Issues in Cloud Computing -- Code-Based Cryptography: A Comparative Study of Key Sizes -- Advance Collision Prevention System -- Energy...

Full text 
10
Mobile Internet Security [E-Book] : 6th International Symposium, MobiSec 2022, Jeju, South Korea, December 15-17, 2022, Revised Selected Papers /
Table of Contents: ... -- Recent Challenges in a New Distributed Learning Paradigm -- Cryptography and Data Security -- Theoretical and Deep Learning Based Analysis of Biases in Salsa 128 bits -- Blind Decryption and Private Information Delivery -- Using Machine Learning for Detecting...

Full text 
11
Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications [E-Book] : 9th International Conference, FDSE 2022, Ho Chi Minh City, Vietnam, November 23-25, 2022, Proceedings /
Table of Contents: ... Lightweight Cryptography enabled Blockchain -- Signature Algorithms on Non-commutative Algebras over Finite Fields of Characteristic Two -- Design a Smart Lock System Using Fingerprint and Password for Enhancing Security -- Machine Learning and Artificial...

Full text 
12
Advances in Artificial Intelligence and Security [E-Book] : 8th International Conference on Artificial Intelligence and Security, ICAIS 2022, Qinghai, China, July 15-20, 2022, Proceedings, Part III /
13
Security and Artificial Intelligence : A Crossdisciplinary Approach [E-Book] /
Table of Contents: ...AI for Cryptography -- Artificial Intelligence for the Design of Symmetric Cryptographic Primitives -- Traditional Machine Learning Methods for Side-Channel Analysis -- Deep Learning on Side-Channel Analysis -- Artificial Neural Networks and Fault...

Full text 
14
Frontiers in Cyber Security [E-Book] : 5th International Conference, FCS 2022, Kumasi, Ghana, December 13-15, 2022, Proceedings /
Table of Contents: ... -- A Gas Cost Analytical Approach based on Certificateless Key Encapsulation Protocol for Medicalized blockchains -- Cryptography -- A Universal Lightweight Privacy-Preserving Multifunctional Data Handling Scheme -- New Trapdoor and Preimage Sampling on NTRU...

Full text 
15
Electronic Voting [E-Book] : 7th International Joint Conference, E-Vote-ID 2022, Bregenz, Austria, October 4-7, 2022, Proceedings /
16
Digital Forensics and Watermarking [E-Book] : 20th International Workshop, IWDW 2021, Beijing, China, November 20-22, 2021, Revised Selected Papers /
17
Data Privacy Management, Cryptocurrencies and Blockchain Technology [E-Book] : ESORICS 2021 International Workshops, DPM 2021 and CBT 2021, Darmstadt, Germany, October 8, 2021, Revised Selected Papers /
18
Cyberspace Safety and Security [E-Book] : 14th International Symposium, CSS 2022, Xi'an, China, October 16-18, 2022, Proceedings /
Table of Contents: ...Cryptography and its applications -- Publicly Verifiable Conjunctive Keyword Search with Balanced Verification Overhead -- Secure and Efficient Certificateless Authenticated Key Agreement Scheme for Smart Healthcare -- Digital Signature Scheme to Match...

Full text 
19
Emerging Information Security and Applications [E-Book] : Third International Conference, EISA 2022, Wuhan, China, October 29-30, 2022, Proceedings /
Table of Contents: ...Asymmetric Secure Multi-Party Signing Protocol for the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography -- A Multi-Task Mobile Crowdsensing Scheme with Conditional Privacy Preserving for Vehicle Networks -- Towards...

Full text 
20
New Trends in Computer Technologies and Applications [E-Book] : 25th International Computer Symposium, ICS 2022, Taoyuan, Taiwan, December 15-17, 2022, Proceedings /
Table of Contents: ... -- Vision-Based Lightweight Facial Respiration and Heart Rate Measurement Technology -- GAN-based Criminal Suspect Face Generator -- Cryptography and Information Security -- Automatic Summarization of Critial Threat Intelligence Using Transfer Learning -- Anti...

Full text