1
Kapralova, Victoria
2021
Table of Contents:
“... Wave Quantum Cryptography -- Development of a Method for Assessing of the Oxygen Supply of Tissues Based on a Multi-Channel Spectrum Analyzer -- Possibilities of Using Optical Solitons in High-Speed Systems -- Fluorescence Quenching of Tetraphenylporphyrin...”2021
Full text
2
3
4
Han, Jinguang
2021
Table of Contents:
“... on Cloud-Fog Collaboration -- An Multi-feature Fusion Object Detection System for Mobile IoT Devices and Edge Computing -- Cryptography -- Generative image steganography based on digital Cardan Grille -- Pixel Grouping Based Image Hashing for DIBR 3D Image...”2021
Full text
5
Boumerdassi, Selma
2021
Table of Contents:
“... -- Efficient and Secure Statistical Port Scan Detection Scheme -- Fast and Flexible Elliptic Curve Cryptography for Dining Cryptographers Networks -- Efficient and Lightweight Polynomial-based Key Management Scheme for Dynamic Networks -- Parallel Applications...”2021
Full text
6
Sako, Kazue
2021
Table of Contents:
“... -- Defending Web Servers Against Flash Crowd Attacks -- Cryptography and its Applications -- TurboIKOS: Improved Non-interactive Zero-Knowledge and Post-Quantum Signatures -- Cryptanalysis of the Binary Permuted Kernel Problem -- Security Comparisons and Performance...”2021
Full text
7
Hong, Deukjo
2021
Table of Contents:
“...Security Models -- Cryptography in Quantum Computer Age -- Constructions and Designs -- Efficient Implementations -- Security Analysis -- Artificial Intelligence and Cryptocurrency -- Fault and Side-Channel Attack....”2021
Full text
8
9
Grasselli, Federico
2021
Table of Contents:
“...Elements of Quantum Information Theory -- Introducing Quantum Key Distribution -- Quantum Conference Key Agreement -- Quantum Key Distribution with Imperfect Devices -- Beyond Point-to-point Quantum Key Distribution -- Device-independent Cryptography....”2021
Full text
10
11
Ryan, Matthew
2021
Table of Contents:
“...Introduction -- Genesis of Ransomware -- Evolution of Applied Cryptography -- Ransomware Economics -- Ransomware Case Studies -- Dangerous Convergences -- Auxiliary Impacts -- Failed Translations -- The Sociology of Ransomware -- Conclusion....”2021
Full text
12
Debnath, Sumit Kumar
2021
Table of Contents:
“... Generation Using Modified RSA -- Efficient Random Grid Visual Cryptographic Schemes having Essential Members -- Further results on bent-negabent Boolean functions -- Generalization of Lattice Based Cryptography on Hypercomplex Algebras -- Health Monitoring...”2021
Full text
13
Jayakumari, J.
2021
Table of Contents:
“... Tolerant Networks -- Opportunistic Networks -- Cognitive Radio Networks -- Satellite Communication -- Cryptography & Data Security -- Cyber-Physical Systems -- Cloud & Fog Computing -- Grid & Cluster Computing -- Part II: Advanced Computing -- AI & Machine...”2021
Full text
14
15
Sako, Kazue
2021
Table of Contents:
“... Cryptography -- Access Control Encryption from Group Encryption -- Password Protected Secret Sharing from Lattices -- Efficient Homomorphic Conversion Between (Ring) LWE Ciphertexts....”2021
Full text
16
Maimut, Diana
2021
Table of Contents:
“... on Identifiers -- A Scalable Simulation of the BB84 Protocol Involving Eavesdropping -- Approach to Cryptography from Di erential Geometry with Example -- On using zk-SNARKs and zk-STARKs inblockchain-based identity management -- Manager asks: Which vulnerability must...”2021
Full text
17
Hughes, Ciaran
2021
Table of Contents:
“...Contents -- 1 Introduction to Superposition -- 2 What is a Qubit? -- 3 Creating Superposition: The Beam Splitter -- 4 Creating Superposition: Stern-Gerlach -- 5 Quantum Cryptography -- 6 Quantum Gates -- 7 Entanglement -- 8 Quantum Teleportation -- 9...”2021
Full text
18
Asplund, Mikael
2021
Table of Contents:
“... cryptography -- (F)unctional Sifting: A Privacy-Preserving Reputation System Through Multi-Input Functional Encryption -- TLV-to-MUC Express: Post-quantum MACsec in VXLAN -- On the Certi cate Revocation Problem in the Maritime Sector -- Security mechanisms...”2021
Full text
19
20
Bandini, Stefania
2021
Table of Contents:
“...Theory and Cryptography -- A Cellular Automaton that computes Shortest Paths in Grid Graph -- Strengthening of ACORN Authenticated Cipher by using Cellular Automata -- Prevention of Fault Attacks in ASCON Authenticated Cipher using Cellular Automata...”2021
Full text