Continued Fractions Applied to a Family of RSA-like Cryptosystems
|
2022 |
Cotan, Paul |
Practical Backdoor Attack Against Speaker Recognition System
|
2022 |
Luo, Yuxiao |
A New Scalable Mutual Authentication in Fog-Edge Drone Swarm Environment
|
2022 |
Han, Kyusuk |
Blockchain-Based Multi-keyword Search on Encrypted COVID-19 Contact Tracing Data
|
2022 |
Ng, Zheng Yao |
Designing Enhanced Robust 6G Connection Strategy with Blockchain
|
2022 |
Thomsen, August Lykke |
Blockchain-Based Confidential Payment System with Controllable Regulation
|
2022 |
Liao, Yu-Chen |
Towards Blockchain-Enabled Intrusion Detection for Vehicular Navigation Map System
|
2022 |
Bodi, Bodi |
Optimal Generic Attack Against Basic Boneh-Boyen Signatures
|
2022 |
Fu, Yen-Kang |
Physical Zero-Knowledge Proof Protocol for Topswops
|
2022 |
Komano, Yuichi |
Secure Human Identification Protocol with Human-Computable Passwords
|
2022 |
Matelski, Sławomir |
Techniques for Continuous Touch-Based Authentication
|
2022 |
Georgiev, Martin |
Federated Intrusion Detection on Non-IID Data for IIoT Networks Using Generative Adversarial Networks and Reinforcement Learning
|
2022 |
Quyen, Nguyen Huu |
Detection of MSOffice-Embedded Malware: Feature Mining and Short- vs. Long-Term Performance
|
2022 |
Viţel, Silviu |
PriApp-Install: Learning User Privacy Preferences on Mobile Apps’ Installation
|
2022 |
Son, Ha Xuan |
Detect Compiler Inserted Run-time Security Checks in Binary Software
|
2022 |
Pramanick, Koyel |
UCC: Universal and Committee-based Cross-chain Framework
|
2022 |
Zhang, Yi |
Blockchain-Based Self-Sovereign Identity System with Attribute-Based Issuance
|
2022 |
Lee, Yi-Hsiu |
A Traceable and Revocable Attribute-based Encryption Scheme Based on Policy Hiding in Smart Healthcare Scenarios
|
2022 |
Zhao, Yang |
M-EDESE: Multi-Domain, Easily Deployable, and Efficiently Searchable Encryption
|
2022 |
Yuan, Jiaming |
Attribute Based Tracing for Securing Group Signatures Against Centralized Authorities
|
2022 |
Perera, Maharage Nisansala Sevwandi |