An Efficient Identification Scheme Based on Rank Metric

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:FPS (12. : 2019 : Toulouse) Foundations and practice of security
1. Verfasser: Ayebie, Edoukou Berenger (VerfasserIn)
Weitere Verfasser: Assidi, Hafsa (VerfasserIn), Souidi, El Mamoun (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2020
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Secure Logging with Security Against Adaptive Crash Attack 2020 Avizheh, Sepideh
U-EPS: An Ultra-small and Efficient Post-quantum Signature Scheme 2020 Gong, Guang
An Efficient Identification Scheme Based on Rank Metric 2020 Ayebie, Edoukou Berenger
Towards Secure TMIS Protocols 2020 Gerault, David
Detecting Ransomware in Encrypted Web Traffic 2020 Modi, Jaimin
A Rejection-Based Approach for Detecting SQL Injection Vulnerabilities in Web Applications 2020 Saoudi, Lalia
Lightweight IoT Mutual Authentication Scheme Based on Transient Identities and Transactions History 2020 Alshahrani, Mohammed
PAC: Privacy-Preserving Arrhythmia Classification with Neural Networks 2020 Mansouri, Mohamad
Using Machine Learning to Detect Anomalies in Embedded Networks in Heavy Vehicles 2020 Shirazi, Hossein
Ransomware Network Traffic Analysis for Pre-encryption Alert 2020 Moussaileb, Routa
Interpreting Machine Learning Malware Detectors Which Leverage N-gram Analysis 2020 Briguglio, William
Get-your-ID: Decentralized Proof of Identity 2020 Lafourcade, Pascal
Towards Privacy-Aware Smart Surveillance 2020 Shirima, Emil
Selection and Performance Analysis of CICIDS2017 Features Importance 2020 Reis, Bruno
Labelled Network Capture Generation for Anomaly Detection for a Customized, Secure, and 2020 Nogues, Maël
Incorporating Off-Line Attribute Delegation into Hierarchical Group and Attribute-Based Access Control 2020 Servos, Daniel
Dynamic Searchable Encryption with Access Control 2020 Blömer, Johannes
Validating the DFA Attack Resistance of AES (Short Paper) 2020 Sugimoto, Hakuei
A Privacy Protection Layer for Wearable Devices 2020 Mohzary, Muhammad
Command dependencies in heuristic safety analysis of access control models 2020 Amthor, Peter
Alle Artikel auflisten