Inhaltsverzeichnis
. - Big data and cloud security.
. - Revocable Registered Attribute-Based Keyword Search Supporting Fairness.
. - HiddenStor: A Steganographic Storage System Built on Secret Sharing.
. - TA-DPDP: Dynamic Provable Data Possession for Online Collaborative System with Tractable Anonymous.
. - Foundations of Cryptography.
. - On the Relationship between Public Key Primitives via Indifferentiability.
. - Lattice-Based Succinct Mercurial Functional Commitment for Boolean Circuits: Definitions, and Constructions.
. - From Signature with Re-Randomizable Keys: Generic Construction of PDPKS.
. - Implementation of Cryptosystems.
. - SIMD Optimizations of White-box Block Cipher Implementations with the Self-equivalence Framework.
. - When Is Multi-Channel Better Than Single-Channel: A Case Study of Product-Based Multi-Channel Fusion Attacks.
. - Key Exchange.
. - Privacy-preserving Certificate-less Authenticated Key Exchange with Key Registration Privacy.
. - An Improved Signal Leakage Attack Against DXL Key Exchange Protocol.
. - srCPace: Universally Composable PAKE with Subversion-Resilience.
. - AI and Security.
. - Analyzing Decentralized Applications Traffic: A Multimodal Approach Based on GNN and BERT.
. - EditPSM: A New Password Strength Meter Based on Password Reuse via Deep Learning.
. - A Binary Code Similarity Detection Method Based on Multi-Source Contrastive Learning.
. - Malware Detection Method Based on Image Sample Reconstruction and Feature Enhancement.
. - Security Analysis.
. - Attention-based Decompilation through Neural Machine Translation.
. - DBridger: Discovering Vulnerable Data Sharing Paths in Embedded Firmware.
. - Privacy-enhancing technologies.
. - Efficient Privacy-Preserving Data Sharing Mechanisms Against Malicious Senders in Smart Grid.
. - NEST: Strong Key-Insulated Password-Based Shared-Custodial Blockchain Wallets.
. - Clustering Coefficient Estimating of Distributed Graph Data based on Shuffled Differential Privacy.
. - Watermarking.
. - Public-Key Watermarkable PRFs with Dynamic Bounded Collusion.
. - A Lossless Relational Data Watermarking Scheme Based on Uneven Partitioning.
. - CNNOVZKP: Convolutional Neural Network Model Ownership Verification with Zero-knowledge Proof.
Es wurden noch keine Bewertungen abgegeben. Schreiben Sie die erste Bewertung zu "Information Security and Cryptology" und helfen Sie damit anderen bei der Kaufentscheidung.