Pages that link to "Item:Q2801766"
From MaRDI portal
The following pages link to Information and Communications Security (Q2801766):
Displaying 49 items.
- SDN-Based Secure Localization in Heterogeneous WSN (Q3297508) (← links)
- A PUF and Software Collaborative Key Protection Scheme (Q3297509) (← links)
- Towards a Trusted and Privacy Preserving Membership Service in Distributed Ledger Using Intel Software Guard Extensions (Q3297512) (← links)
- Deobfuscation of Virtualization-Obfuscated Code Through Symbolic Execution and Compilation Optimization (Q3297513) (← links)
- A Self-healing Key Distribution Scheme for Mobile Ad Hoc Networks (Q3297516) (← links)
- SecHome: A Secure Large-Scale Smart Home System Using Hierarchical Identity Based Encryption (Q3297518) (← links)
- Multi-attribute Counterfeiting Tag Identification Protocol in Large-Scale RFID System (Q3297520) (← links)
- A Method to Effectively Detect Vulnerabilities on Path Planning of VIN (Q3297521) (← links)
- Perturbation Paradigms of Maintaining Privacy-Preserving Monotonicity for Differential Privacy (Q3297522) (← links)
- Verifiable and Forward Secure Dynamic Searchable Symmetric Encryption with Storage Efficiency (Q3297524) (← links)
- Hypercubes and Private Information Retrieval (Q3297525) (← links)
- An Experimental Study of Kannan’s Embedding Technique for the Search LWE Problem (Q3297526) (← links)
- SDAC: A New Software-Defined Access Control Paradigm for Cloud-Based Systems (Q3297530) (← links)
- A Cross-Modal CCA-Based Astroturfing Detection Approach (Q3297532) (← links)
- Secure and Efficient Two-Factor Authentication Protocol Using RSA Signature for Multi-server Environments (Q3297533) (← links)
- Authenticated Group Key Agreement Protocol Without Pairing (Q3297534) (← links)
- Machine Learning for Black-Box Fuzzing of Network Protocols (Q3297536) (← links)
- A Novel Semantic-Aware Approach for Detecting Malicious Web Traffic (Q3297537) (← links)
- An Active and Dynamic Botnet Detection Approach to Track Hidden Concept Drift (Q3297539) (← links)
- Statically Defend Network Consumption Against Acker Failure Vulnerability in Storm (Q3297543) (← links)
- Pollution Attacks Identification in Structured P2P Overlay Networks (Q3297547) (← links)
- Cryptanalysis of ID-Based Authenticated Key Agreement Protocols from Bilinear Pairings (Short Paper) (Q3535344) (← links)
- Seifert’s RSA Fault Attack: Simplified Analysis and Generalizations (Q3535345) (← links)
- Threshold Implementations Against Side-Channel Attacks and Glitches (Q3535346) (← links)
- A language for specifying sequences of authorization transformations and its applications (Q4373610) (← links)
- Traceable visual cryptography (Q4373612) (← links)
- Remarks on the multiple assignment secret sharing scheme (Q4373613) (← links)
- Secret sharing in hierarchical groups (Q4373614) (← links)
- Stateless connections (Q4373615) (← links)
- Design of a security platform for CORBA based application (Q4373620) (← links)
- Secure document management and distribution in an open network environment (Q4373622) (← links)
- A2-code = Affine resolvable + BIBD (Q4373623) (← links)
- Cryptanalysis of Multi-Prime RSA with Small Prime Difference (Q4913722) (← links)
- Implicit Polynomial Recovery and Cryptanalysis of a Combinatorial Key Cryptosystem (Q4913723) (← links)
- Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures (Q5452276) (← links)
- New Construction of Group Secret Handshakes Based on Pairings (Q5452277) (← links)
- nPAKE + : A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords (Q5452278) (← links)
- An Efficient Password-Only Two-Server Authenticated Key Exchange System (Q5452279) (← links)
- Formal Definition and Construction of Nominative Signature (Q5452280) (← links)
- Short Group Signature Without Random Oracles (Q5452281) (← links)
- (Convertible) Undeniable Signatures Without Random Oracles (Q5452282) (← links)
- A New Dynamic Accumulator for Batch Updates (Q5452283) (← links)
- Efficient Adaptive Oblivious Transfer Without q-type Assumptions in UC Framework (Q5507372) (← links)
- A Guess-Then-Algebraic Attack on LFSR-Based Stream Ciphers with Nonlinear Filter (Q5507373) (← links)
- New Security Proof for the Boneh-Boyen IBE: Tight Reduction in Unbounded Multi-challenge Security (Q5507374) (← links)
- Attribute Based Key-Insulated Signatures with Message Recovery (Q5507375) (← links)
- XOR Based Non-monotone t- $$(k,n)^*$$ -Visual Cryptographic Schemes Using Linear Algebra (Q5507376) (← links)
- Secure and Efficient Scheme for Delegation of Signing Rights (Q5507377) (← links)
- Fully Secure Ciphertext-Policy Attribute Based Encryption with Security Mediator (Q5507378) (← links)