1
Gupta, Nishu
2024
Table of Contents:
“... Dictionary -- Creating a Protected Virtual Learning Space: A Comprehensive Strategy for Security and User Experience in Online Education -- LIGHTWEIGHT CRYPTOGRAPHY MODEL FOR OVERHEAD AND DELAY REDUCTION IN THE NETWORK -- Modelling the Data Object Routing in Data...”2024
Full text
2
Tan, Zhiyuan
2024
Table of Contents:
“... Graph Convolutional Network for Long Term Traffic Forecasting -- Image Forgery Detection using Cryptography and Deep Learning -- Revocable Attribute-based Encryption Scheme With Cryptographic Reverse Firewalls -- IoT Attacks Countermeasures: Systematic Review...”2024
Full text
3
4
5
6
Carlet, Claude
2024
Table of Contents:
“... -- Symmetric cryptography and fault attacks -- The Random Fault Model -- Probabilistic Related-Key Statistical Saturation Cryptanalysis -- Compactly Committing Authenticated Encryption Using Encryptment and Tweakable Block Cipher -- Post-Quantum Analysis...”2024
Full text
7
8
Sharp, Robin
2024
Table of Contents:
“...Chapter 1. Introduction: Why cybersecurity? -- Chapter 2. Technique and human beings -- Chapter 3. Risk -- Chapter 4. Cryptography -- Chapter 5. Applied Cryptography -- Chapter 6. Communication networks -- Chapter 7. Network Applications -- Chapter 8...”2024
Full text
9
Kizza, Joseph Migga
2024
Table of Contents:
“... in Computer Networks and Web Browsers -- 6. Security Assessment, Analysis, and Assurance -- 7. Disaster Management -- Access Control and Authorization -- 8. Authentication Control and Authorization -- 9. Authentication -- Cryptography -- 10. Firewalls -- 11. System...”2024
Full text
10
11
Lu, Rongxing
2024
Table of Contents:
“... -- Cryptography and Encryption Techniques -- Heterogeneous Aggregate Signature for Unmanned Aerial Vehicles -- Secure arbitrated quantum signature scheme with Bell state -- An Authorized Function Homomorphic Proxy Signature Scheme with Sampling Batch Verification...”2024
Full text
12
13
Gao, Honghao
2024
Table of Contents:
“... Using Elliptic Curve Cryptography -- A Novel Semi-supervised IoT Time Series Anomaly Detection Model using Graph Structure Learning -- Structural Adversarial Attack for Code Representation Models -- An Efficient Authentication and Key Agreement Scheme for CAV...”2024
Full text
14
15
16
Goel, Sanjay
2024
Table of Contents:
“...Password, Authentication and Cryptography -- A Quantum Physics approach for enabling Informationtheoretic Secure Communication Channels -- Learning framework for guessing alphanumeric passwords on mobile phones based on user context and fragment...”2024
Full text
17
Abou el Kalam, Anas
2024
Table of Contents:
“... of Alzheimer's Disease using Deep Learning: A Comprehensive Analysis -- Pattern Recognition in Blockchain, IOT, Cyber Plus Network Security, and Cryptography -- VAIDS: A Hybrid Deep Learning Model to Detect Intrusions in MQTT Protocol Enabled Networks -- Crypto Bank...”2024
Full text
18
Table of Contents:
“...Coding Theory -- Symmetric Cryptography: Constructions and Attacks -- Zero-Knowledge Protocols -- Digital Signature Schemes and Extensions -- Advances in Post-Quantum Cryptography -- Cryptography in practice: Analyses and Constructions....”
Full text
Full text
19
Mazumdar, Bodhisatwa
2024
Table of Contents:
“... Generic Insider Secure Signcryption with Non-Interactive Non-Repudiation -- High-Order Collision Attack Vulnerabilities in Montgomery Ladder Implementations of RSA -- On the Masking-Friendly Designs for Post-Quantum Cryptography -- Spliced Region Detection...”2024
Full text
20