Use of Blockchain for Ensuring Data Integrity ın Cloud Databases

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:CSCML (5. : 2021 : Beer Sheva) Cyber Security Cryptography and Machine Learning
1. Verfasser: Vainshtein, Yakov (VerfasserIn)
Weitere Verfasser: Gudes, Ehud (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2021
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Robust Multivariate Anomaly-Based Intrusion Detection System for Cyber-Physical Systems 2021 Dutta, Aneet Kumar
Privacy Vulnerability of NeNDS Collaborative Filtering 2021 Nussbaum, Eyal
History Binding Signature: (Extended Abstract) 2021 Dolev, Shlomi
Software Integrity and Validation Using Cryptographic Composability and Computer Vision 2021 Beaver, Donald
Meta-X: A Technique for Reducing Communication in Geographically Distributed Computations 2021 Afrati, Foto
Programmable Bootstrapping Enables Efficient Homomorphic Inference of Deep Neural Networks 2021 Chillotti, Ilaria
DepthStAr: Deep Strange Arguments Detection 2021 Berlin, Michael
Tortoise and Hares Consensus: The Meshcash Framework for Incentive-Compatible, Scalable Cryptocurrencies 2021 Hubáček, Iddo Bentov. Pavel
Game of Drones - Detecting Spying Drones Using Time Domain Analysis 2021 Nassi, Ben
Lawful Interception in WebRTC Peer-To-Peer Communication 2021 Wagner, Assaf
Hierarchical Ring Signatures Immune to Randomness Injection Attacks 2021 Krzywiecki, Lukasz
Warped Input Gaussian Processes for Time Series Forecasting 2021 Vinokur, Igor
Polynomial Time k-Shortest Multi-criteria Prioritized and All-Criteria-Disjoint Paths: (Extended Abstract) 2021 Dinitz, Yefim
DNS-Morph: UDP-Based Bootstrapping Protocol for Tor 2021 Ailabouni, Rami
Fully Dynamic Password Protected Secret Sharing: Simplifying PPSS Operation and Maintenance 2021 Patel, Akif
Trust and Verify: A Complexity-Based IoT Behavioral Enforcement Method 2021 Haefner, Kyle
Implementing GDPR in Social Networks Using Trust and Context 2021 Voloch, Nadav
Adversarijes Strike Hard: Adversarial Attacks Against Malware Classifiers Using Dynamic API Calls as Features 2021 Hariom
Principal Component Analysis Using CKKS Homomorphic Scheme 2021 Panda, Samanvaya
Privacy-Preserving Password Strength Meters with FHE 2021 Emmadi, Nitesh
Alle Artikel auflisten