61
Badhwar, Raj
2021
Table of Contents:
“...Are you ready for Quantum computing? -- The need for post-quantum cryptography -- Quantum Encryption is not a Paradox -- AI Code of Ethics for Cybersecurity -- The Case of AI/ML in Cybersecurity -- Security for Work-From-Home Technologies -- Secure video...”2021
Full text
62
Ardito, Carmelo
2021
Table of Contents:
“...Lattice-Based Cryptography A trace map attack against special ring-LWE samples -- Shortest Vectors in Lattices of Bai-Galbraith's Embedding Attack on the LWR Problem -- System Security KPRM: Kernel Page Restriction Mechanism to Prevent Kernel Memory...”2021
Full text
63
Ambeth Kumar, V. D.
2021
Table of Contents:
“...-Nearest Neighbor and Decision Tree Algorithm -- Implementation of IoT in Workplace Monitoring and Safety Systems -- IoT Based Smart Energy Meter System Using Machine Learning -- Personalized CAPTCHA Using Cognitive Cryptography -- Enhancement of Routing...”2021
Full text
64
65
66
67
68
69
Table of Contents:
“... -- Accelerating The Classifier Training Using Various Boosting Schemes Within Cascades Of Boosted Ensembles (Cobes) -- Service Layer Security Architecture For Iot Using Biometric Authentication And Cryptography Technique....”
Full text
Full text
70
Fricker, Samuel
2020
Table of Contents:
“... Management: State of the Art, Challenges and Perspectives -- SoK: Cryptography for Neural Networks -- Workshop on Privacy Challenges in Public and Private Organizations -- News diversity and recommendation systems: Setting the interdisciplinary scene -- Language...”2020
Full text
71
72
Agrawal, Jitendra
2019
Table of Contents:
“... authentication using Elliptic curve Cryptography -- Log-based Approach for Security Implementation in Cloud CRM's -- Performance Analysis of Scheduling Algorithms in Apache Hadoop -- Energy Aware Prediction Based Load Balancing Approach with VM Migration for the Cloud...”2019
Full text
73
Catania, Barbara
2016
Table of Contents:
“...Foundations of Computer Science -- Cryptography in a Quantum World -- Relating Sublinear Space Computability among Graph Connectivity and Related Problems -- Learning Automatic Families of Languages -- Software Engineering: Methods, Tools, Applications...”2016
Full text
74
Dinh, Thang N.
2016
Table of Contents:
“...Game Theory and Algorithms -- Parameterized Complexity and Algorithms -- Database and Data Structures -- Computational Complexity -- Approximation Algorithms -- Cryptography -- Network and Algorithms -- Graph Theory and Algorithms.-Computational Geometry...”2016
Full text
75
76
Khooshabeh, Peter
2016
Table of Contents:
“...Attribute/Role-based Cryptography -- Data in Cloud -- Searchable Encryption -- Key Management -- Encryption -- Leakage Analysis -- Homomorphic Encryption. ....”2016
Full text
77
Ogawa, Kazuto
2016
Table of Contents:
“...System security -- Searchable encryption -- Cryptanalysis -- Permutation and symmetric encryption -- Privacy preserving -- Hardware security -- Post-quantum cryptography -- Paring computation....”2016
Full text
78
79
80