41
Table of Contents:
“... -- Biometrics & Authentification -- Biosignal Processing & Understanding -- Communication and Broadband Networks -- Computer Vision & Virtual Reality -- Cryptography and Network Security -- Design and Implementation of Signal Processing Systems -- Compressive sensing...”
Full text
Full text
42
Batra, Usha
2024
Table of Contents:
“... Sage Maker -- Multi-Key Fully Homomorphic Encryption Scheme Over Integers -- Hybrid Lightweight Cryptography using AES and ECC for IoT Security -- A Survey: Analysis of Existing Hybrid Cryptographic Techniques -- Cloud based Integrated Real-Time Twitter...”2024
Full text
43
44
45
Abou el Kalam, Anas
2024
Table of Contents:
“... of Alzheimer's Disease using Deep Learning: A Comprehensive Analysis -- Pattern Recognition in Blockchain, IOT, Cyber Plus Network Security, and Cryptography -- VAIDS: A Hybrid Deep Learning Model to Detect Intrusions in MQTT Protocol Enabled Networks -- Crypto Bank...”2024
Full text
46
Tan, Zhiyuan
2024
Table of Contents:
“... Graph Convolutional Network for Long Term Traffic Forecasting -- Image Forgery Detection using Cryptography and Deep Learning -- Revocable Attribute-based Encryption Scheme With Cryptographic Reverse Firewalls -- IoT Attacks Countermeasures: Systematic Review...”2024
Full text
47
48
Gao, Honghao
2024
Table of Contents:
“... Using Elliptic Curve Cryptography -- A Novel Semi-supervised IoT Time Series Anomaly Detection Model using Graph Structure Learning -- Structural Adversarial Attack for Code Representation Models -- An Efficient Authentication and Key Agreement Scheme for CAV...”2024
Full text
49
50
51
Elahi, Ata
2024
Table of Contents:
“...) -- Introduction to Cryptography -- Network Security -- Conclusion....”2024
Full text
52
53
54
Table of Contents:
“... System -- A Systematic Method for Constructing ICT Supply Chain Security Requirements -- Pairing Compression on Some Elliptic Curves with Subgroups of Embedding Degree 6 and its Applications to Pairing-based Cryptography -- Enhancing Chinese Named Entity...”
Full text
Full text
55
56
57
58
Tibouchi, Mehdi
2023
Table of Contents:
“...Embedded security -- Privacy-preserving protocols -- Isogeny-based cryptography -- Encryption -- Advanced primitives -- Multiparty computation -- Blockchain....”2023
Full text
59
Tibouchi, Mehdi
2023
Table of Contents:
“...Side-channel and fault attacks -- Symmetric cryptanalysis -- Web security -- Elliptic curves and pairings -- Homomorphic cryptography -- Machine learning -- Lattices and codes....”2023
Full text
60