DCONST: Detection of Multiple-Mix-Attack Malicious Nodes Using Consensus-Based Trust in IoT Networks

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:ACISP (25. : 2020 : Perth, Western Australia; Online) Information security and privacy
1. Verfasser: Ma, Zuchao (VerfasserIn)
Weitere Verfasser: Liu, Liang (VerfasserIn), Meng, Weizhi (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2020
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Lattice Blind Signatures with Forward Security 2020 Le, Huy Quoc
On Lattice-Based Interactive Protocols: An Approach with Less or No Aborts 2020 Alkadri, Nabil Alkeilani
Cloud-Assisted Asynchronous Key Transport with Post-Quantum Security 2020 Davies, Gareth T.
Parallel Implementation of SM2 Elliptic Curve Cryptography on Intel Processors with AVX2 2020 Huang, Junhao
A Black-Box Attack on Neural Networks Based on Swarm Evolutionary Algorithm 2020 Liu, Xiaolei
Improving Key Mismatch Attack on NewHope with Fewer Queries 2020 Okada, Satoshi
Improvement of Attribute-Based Encryption Using Blakley Secret Sharing 2020 Xia, Zhe
SKCN: Practical and Flexible Digital Signature from Module Lattice 2020 Gong, Boru
Optimized Arithmetic Operations for Isogeny-Based Cryptography on Huff Curves 2020 Huang, Yan
Rotational-XOR Cryptanalysis of Simon-Like Block Ciphers 2020 Lu, Jinyu
From Rerandomizability to Sequential Aggregation: Efficient Signature Schemes Based on SXDH Assumption 2020 Chatterjee, Sanjit
Improved Security Proof for the Camenisch-Lysyanskaya Signature-Based Synchronized Aggregate Signature Scheme 2020 Tezuka, Masayuki
New Assumptions and Efficient Cryptosystems from the e-th Power Residue Symbol 2020 Zhao, Xiaopeng
Multi-input Laconic Function Evaluation 2020 Pang, Bo
Arbitrary-Centered Discrete Gaussian Sampling over the Integers 2020 Du, Yusong
DeepCapture: Image Spam Detection Using Deep Learning and Data Augmentation 2020 Kim, Bedeuro
Design and Evaluation of Enumeration Attacks on Package Tracking Systems 2020 Jang, Hanbin
Secure and Compact Elliptic Curve LR Scalar Multiplication 2020 Jin, Yaoan
Unlinkable Updatable Databases and Oblivious Transfer with Access Control 2020 Damodaran, Aditya
Tightly Secure Chameleon Hash Functions in the Multi-user Setting and Their Applications 2020 Liu, Xiangyu
Alle Artikel auflisten