AI-Powered Vulnerability Detection for Secure Source Code Development

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:SecITC (15. : 2022 : Online) Innovative security solutions for information technology and communications
1. Verfasser: Rajapaksha, Sampath (VerfasserIn)
Weitere Verfasser: Senanayake, Janaka (VerfasserIn), Kalutarage, Harsha (VerfasserIn), Al-Kadri, Omar (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2023
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Lightweight Permutation-Based Cryptography for the Ultra-Low-Power Internet of Things 2023 Alsahli, Malik
Constructing Pairing Free Unbounded Inner Product Functional Encryption Schemes with Unbounded Inner Product Policy 2023 Dutta, Subhranil
Easy-ABE: An Easy Ciphertext-Policy Attribute-Based Encryption 2023 Ka, Ahmad Khoureich
MILP-Aided Cryptanalysis of the FUTURE Block Cipher 2023 llter, Murat Burhan
Application-Oriented Anonymization Framework for Social Network Datasets and IoT Environments 2023 Medkovda, Jana
Superpoly Recovery of Grain-128AEAD Using Division Property 2023 Chakraborty, Debasmita
MOTUS: How Quantized Parameters Improve Protection of Model and Its Inference Input 2023 Kitai, Hiromasa
Towards Verifying Physical Assumption in Card-Based Cryptography 2023 Shimano, Masahisa
Interactional Freedom and Cybersecurity 2023 Bella, Giampaolo
Bridges Connecting Encryption Schemes 2023 Barcau, Mugurel
On Single-Server Delegation of RSA 2023 Crescenzo, Giovanni Di
Efficient Distributed Keys Generation of Threshold Paillier Cryptosystem 2023 Hamidi, Amirreza
Statistical Tests for Symmetric Primitives: An Application to NIST Lightweight Finalists 2023 Bellini, Emanuele
Activity Detection from Encrypted Remote Desktop Protocol Traffic 2023 Lapczyk, Lukasz
Lightweight Authentication Using Noisy Key Derived from Physically Unclonable Function 2023 Komano, Yuichi
Card-Based Zero-Knowledge Proof Protocol for Pancake Sorting 2023 Komano, Yuichi
AI-Powered Vulnerability Detection for Secure Source Code Development 2023 Rajapaksha, Sampath
The Security of Quasigroups Based Substitution Permutation Networks 2023 Teseleanu, George
Unbounded Revocable Decentralized Multi-Authority Attribute-Based Encryption Supporting Non-monotone Access Structures 2023 Ishibashi, lakuya
Alle Artikel auflisten