21
Fritsch, Lothar
2024
Table of Contents:
“...Privacy and data protection -- Cryptography, protocols, analysis -- Cyber security -- Aspects of trust -- Defenses and forensics -- Machine learning and artificial intelligence in information security....”2024
Full text
22
Abou el Kalam, Anas
2024
Table of Contents:
“... of Alzheimer's Disease using Deep Learning: A Comprehensive Analysis -- Pattern Recognition in Blockchain, IOT, Cyber Plus Network Security, and Cryptography -- VAIDS: A Hybrid Deep Learning Model to Detect Intrusions in MQTT Protocol Enabled Networks -- Crypto Bank...”2024
Full text
23
24
25
26
27
28
Table of Contents:
“... System -- A Systematic Method for Constructing ICT Supply Chain Security Requirements -- Pairing Compression on Some Elliptic Curves with Subgroups of Embedding Degree 6 and its Applications to Pairing-based Cryptography -- Enhancing Chinese Named Entity...”
Full text
Full text
29
Gupta, Nishu
2024
Table of Contents:
“... Dictionary -- Creating a Protected Virtual Learning Space: A Comprehensive Strategy for Security and User Experience in Online Education -- LIGHTWEIGHT CRYPTOGRAPHY MODEL FOR OVERHEAD AND DELAY REDUCTION IN THE NETWORK -- Modelling the Data Object Routing in Data...”2024
Full text
30
31
32
Ge, Chunpeng
2024
Table of Contents:
“... Transformers -- Cryptography Engineering: Hardware Acceleration of NTT-Based Polynomial Multiplication in CRYSTALS-Kyber -- V-Curve25519: Efficient Implementation of Curve25519 on RISC-V Architecture -- Cryptanalysis: Improved Integral Cryptanalysis of Block Ciphers...”2024
Full text
33
Carlet, Claude
2024
Table of Contents:
“... -- Symmetric cryptography and fault attacks -- The Random Fault Model -- Probabilistic Related-Key Statistical Saturation Cryptanalysis -- Compactly Committing Authenticated Encryption Using Encryptment and Tweakable Block Cipher -- Post-Quantum Analysis...”2024
Full text
34
35
Kim, Suhri
2024
Table of Contents:
“...: Pseudo-HAL Identification for Scalable Firmware Fuzzing -- Lightweight Anomaly Detection Mechanism based on Machine Learning Using Low-Cost Surveillance Cameras -- Applied Cryptography -- Enhancing Prediction Entropy Estimation of RNG for On-the-Fly Test...”2024
Full text
36
37
38
39
Tan, Zhiyuan
2024
Table of Contents:
“... Graph Convolutional Network for Long Term Traffic Forecasting -- Image Forgery Detection using Cryptography and Deep Learning -- Revocable Attribute-based Encryption Scheme With Cryptographic Reverse Firewalls -- IoT Attacks Countermeasures: Systematic Review...”2024
Full text
40