81
Inventive Communication and Computational Technologies [E-Book] : Proceedings of ICICCT 2022 /
Table of Contents: ...A Comparitive Study of Employee Attrition Analysis using Machine Learning and Deep Learning Techniques -- Efficient RNS Realization of High Speed Arithmetic Multiplier with Respect to Cryptographic Computation -- An Integrated Terrestrial - Satellite...

Full text 
82
Selected Areas in Cryptography [E-Book] : 28th International Conference, Virtual Event, September 29 - October 1, 2021, Revised Selected Papers /
83
Security and Artificial Intelligence : A Crossdisciplinary Approach [E-Book] /
Table of Contents: ...AI for Cryptography -- Artificial Intelligence for the Design of Symmetric Cryptographic Primitives -- Traditional Machine Learning Methods for Side-Channel Analysis -- Deep Learning on Side-Channel Analysis -- Artificial Neural Networks and Fault...

Full text 
84
Public-Key Cryptography - PKC 2022 [E-Book] : 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part I /
Table of Contents: ... for SPDZ from Ring-LPN -- Fast Batched DPSS and its Applications -- CNF-FSS and its Applications -- Cryptographic Protocols -- Effcient Verifiable Partially-Decryptable Commitments from Lattices and Applications -- Making Private Function Evaluation Safer...

Full text 
85
Public-Key Cryptography - PKC 2022 [E-Book] : 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part II /
86
Advances in Cryptology - EUROCRYPT 2022 [E-Book] : 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part I /
87
Cyber Security, Cryptology, and Machine Learning [E-Book] : 6th International Symposium, CSCML 2022, Be'er Sheva, Israel, June 30 - July 1, 2022, Proceedings /
Table of Contents: ... We Did It -- Etherless Ethereum Tokens: Simulating Native Tokens in Ethereum -- A Linear-Time 2-Party Secure Merge Protocol -- FairMM: A Fast and Frontrunning-Resistant Crypto Market-Maker.-In-app Cryptographically-Enforced Selective Access Control...

Full text 
88
Science of Cyber Security [E-Book] : 4th International Conference, SciSec 2022, Matsue, Japan, August 10-12, 2022, Revised Selected Papers /
Liu, Feng
2022
Table of Contents: ... Semi-homomorphic Encryption, and the Extension to DOT -- Scalable M+1st-Price Auction with Infinite Bidding Price -- The Shared Memory based Cryptographic Card Virtualization -- Network Security -- Feature Transfer based Network Anomaly Detection -- Hybrid...

Full text 
89
Security, Privacy, and Applied Cryptography Engineering [E-Book] : 11th International Conference, SPACE 2021, Kolkata, India, December 10-13, 2021, Proceedings /
90
Topics in Cryptology - CT-RSA 2022 [E-Book] : Cryptographers' Track at the RSA Conference 2022, Virtual Event, March 1-2, 2022, Proceedings /
91
Rewriting Logic and Its Applications : 14th International Workshop, WRLA 2022, Munich, Germany, April 2-3, 2022, Revised Selected Papers [E-Book] /
Table of Contents: ... for Cryptographic Protocol Analysis -- Maude as a Library: An Efficient All-Purpose Programming Interface....

Full text 
92
Innovative Security Solutions for Information Technology and Communications [E-Book] : 14th International Conference, SecITC 2021, Virtual Event, November 25-26, 2021, Revised Selected Papers /
Table of Contents: ... from Public Forums -- A Forensic Framework for Webmail Threat Detection using Log Analysis -- An Evaluation of the Multi-Platform Efficiency of Lightweight Cryptographic Permutations -- Optimized Implementation of SHA-512 for 16-bit MSP430 Microcontrollers...

Full text 
93
Provable and Practical Security [E-Book] : 16th International Conference, ProvSec 2022, Nanjing, China, November 11-12, 2022, Proceedings /
Table of Contents: ... Without Adaptivity Or Zero-Knowledge -- Practical Non-Malleable Codes from Symmetric-key Primitives in 2-Split-State Model -- Cryptographic Role-Based Access Control, Reconsidered....

Full text 
94
Cryptology and Network Security [E-Book] : 21st International Conference, CANS 2022, Abu Dhabi, United Arab Emirates, November 13-16, 2022, Proceedings /
Table of Contents: ... for Health Monitoring and Countermeasures via Distinct SMs with Key Split and Refresh -- Cryptanalysis of the Multi-Power RSA Cryptosystem Variant -- Provable Security of HADES Structure -- Cryptographic Protocols -- Practical Single-pass Oblivious Aggregation...

Full text 
95
Soft Computing for Security Applications [E-Book] : Proceedings of ICSCS 2021 /
Table of Contents: ...Facial Image Denoising and Reconstruction -- One Method for RC5 Algorithm's Cryptographic Strength Improving -- Multiclass Classi´Čücation of Firewall Log Files Using Shallow Neural Network for Network Security Applications -- On the Possibility of Evasion...

Full text 
96
Essential cryptography for JavaScript developers : a practical guide to leveraging common cryptographic operations in Node.js and the browser [E-Book] /
Table of Contents: ...Essential cryptography for JavaScript developers : a practical guide to leveraging common cryptographic operations in Node.js and the browser -- Contributors -- Table of Contents -- Preface -- Part 1 - Getting Started -- Chapter 1: Cryptography...

Full text 
97
Secure, Low-Power IoT Communication Using Edge-Coded Signaling [E-Book] /
98
Multimedia Technologies in the Internet of Things Environment, Volume 3 [E-Book] /
Table of Contents: ... Processing and Multimedia Oriented IoT: Tools for Sustainable Development of Smart Cities -- Big Data Analytics and Data Mining for Healthcare Informatics (HCI) -- Integration of Quantum Computing and Blockchain Technology: A Cryptographic Perspective....

Full text 
99
Advances in Cryptology - EUROCRYPT 2022 [E-Book] : 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part II /
100
Computer Security - ESORICS 2022 [E-Book] : 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part II /
Table of Contents: ... First-Order Temporal Logic -- A Tale of Four Gates - Privilege Escalation and Permission Bypasses on Android through App Components -- Authentication -- Sequential Digital Signatures for Cryptographic Software-Update Authentication -- On Committing...

Full text