A Traceable and Revocable Attribute-based Encryption Scheme Based on Policy Hiding in Smart Healthcare Scenarios
|
2022 |
Zhao, Yang |
M-EDESE: Multi-Domain, Easily Deployable, and Efficiently Searchable Encryption
|
2022 |
Yuan, Jiaming |
Attribute Based Tracing for Securing Group Signatures Against Centralized Authorities
|
2022 |
Perera, Maharage Nisansala Sevwandi |
Differential Cryptanalysis of Salsa20 Based on Comprehensive Analysis of PNBs
|
2022 |
Ghafoori, Nasratullah |
Anonymous Authentication Protocols in Vehicular Ad Hoc Network-An Survey
|
2022 |
Fu, Guiwen |
Performance Evaluation of Post-Quantum TLS 1.3 on Resource-Constrained Embedded Systems
|
2022 |
Tasopoulos, George |
Detection of Adversarial Examples Based on the Neurons Distribution
|
2022 |
Zeng, Jiang-Yi |
BADPASS: Bots Taking ADvantage of Proxy as a Service
|
2022 |
Chiapponi, Elisa |
Sparse Attack on Skeleton-Based Human Action Recognition for Internet of Video Things Systems
|
2022 |
Huang, Yinqin |
A Low-Cost and Cloud Native Solution for Security Orchestration, Automation, and Response
|
2022 |
Christian, Juan |
Protecting Cyber-Physical System Testbeds from Red-Teaming/Blue-Teaming Experiments Gone Awry
|
2022 |
Talukder, Md Rakibul Hasan |
Sherlock Holmes Zero-Knowledge Protocols
|
2022 |
Teşeleanu, George |
A CNN-Based Semi-supervised Learning Approach for the Detection of SS7 Attacks
|
2022 |
Ermis, Orhan |
Preventing Adversarial Attacks Against Deep Learning-Based Intrusion Detection System
|
2022 |
Nguyen, Xuan-Ha |
Evaluating the Possibility of Evasion Attacks to Machine Learning-Based Models for Malicious PowerShell Detection
|
2022 |
Mezawa, Yuki |
Using API Calls for Sequence-Pattern Feature Mining-Based Malware Detection
|
2022 |
Balan, Gheorghe |
LMGROUP: A Lightweight Multicast Group Key Management for IoT Networks
|
2022 |
Nikbakht Bideh, Pegah |
Robust Anomaly Detection via Radio Fingerprinting in LoRa-Enabled IIoT
|
2022 |
Halder, Subir |
Optimal Generic Attack Against Basic Boneh-Boyen Signatures
|
2022 |
Fu, Yen-Kang |
Physical Zero-Knowledge Proof Protocol for Topswops
|
2022 |
Komano, Yuichi |