1
Chen, Xiaofeng
2022
Table of Contents:
“... Proxy Re-encryption for Secure Deduplication -- A Secure Word Vector Training Scheme Based on Inner-Product Functional Encryption -- D2D Authentication Scheme for IoT-enabled Smart Home -- Inner Product Encryption from Middle-Product Learning with Errors...”2022
Full text
2
Adepu, Sridhar
2022
Table of Contents:
“...-Safe Link -- POSTER: Enabling User-Accountable Mechanisms in Decision Systems -- POSTER: Key Generation Scheme Based on Physical Layer -- POSTER: ODABE: Outsourced Decentralized CP-ABE in Internet of Things -- POSTER: Ransomware detection mechanism - current...”2022
Full text
3
Ahene, Emmanuel
2022
Table of Contents:
“... -- Enabling Hidden Frequency Keyword-Based Auditing on Distributed Architectures for a Smart Government -- A Lightweight Certificateless Searchable Public Key Encryption Scheme for Medical Internet of Things -- Artificial Intelligence and Cyber Security -- Cross...”2022
Full text