Ensuring the Big Data Integrity Through Verifiable Zero-Knowledge Operations

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:MobiSec (5. : 2021 : Jeju; Online) Mobile internet security
1. Verfasser: Aleksandrova, Elena B. (VerfasserIn)
Weitere Verfasser: Poltavtseva, Maria A. (VerfasserIn), Shmatov, Vadim S. (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2022
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Secure LoRaWAN Root Key Update Scheme for IoT Environment 2022 Tsai, Kun-Lin
A Credible Information Fusion Method Based on Cascaded Topology Interactive Traceability 2022 Gao, Yueging
Semantic Embedding-Based Entity Alignment for Cybersecurity Knowledge Graphs 2022 Kim, Minhwan
A Secure Dispersed Computing Scheme for Internet of Mobile Things 2022 Zhao, Yan
Future Applications of Blockchain in Education Sector: A Semantic Review 2022 Gharat, Paresh Sajan
A Blockchain-Based Authentication Scheme for 5G Applications 2022 Ren, Lanfang
Forensic Analysis of Fitness Applications on Android 2022 Sinha, Rahul
Trojan Attacks and Defense for Speech Recognition 2022 Zong, Wei
A Systematic Literature Review on the Mobile Malware Detection Methods 2022 Kim, Yu-kyung
Detection of Business Email Compromise Attacks with Writing Style Analysis 2022 Vorobeva, Alisa
Development of Total Security Platform to Protect Autonomous Car and Intelligent Traffic System Under 5G Environment 2022 Lee, WonHaeng
Distributed Trust and Reputation Services in Pervasive Internet-of-Things Deployments 2022 Bordel, Borja
The Design and Implementation of Blockchain-Assisted User Public-Private Key Generation Method 2022 Zhang, Tianhong
Smart Contract-Based Personal Data Protection Framework: In Cross-App Advertising 2022 Shi, Yuyuan
Forensic Analysis of Apple CarPlay: A Case Study 2022 Lee, Junsu
A DDoS Detection Method with Feature Set Dimension Reduction 2022 Li, Man
A Resource-Blockchain Framework for Safeguarding IoT 2022 Bharti, Monika
Fingerprint Defender: Defense Against Browser-Based User Tracking 2022 Moad, Deepali
Which One is More Robust to Low-Rate DDoS Attacks? The Multipath TCP or The SCTP 2022 Ji, Lejun
Classification and Analysis of Vulnerabilities in Mobile Device Infrastructure Interfaces 2022 Izrailov, Konstantin
Alle Artikel auflisten