„Secure Computing“
Suchergebnisse
616 Treffer
-
Quantum verifiable protocol for secure modulo zero-sum randomness
-
Chain-structure time-delay reservoir computing for synchronizing chaotic signal and an application to secure communication
-
Quantum secure two-party Euclidean distance computation based on mutually unbiased bases
-
Measurement device–independent quantum secure direct communication with user authentication
-
Secure communications based on sending-or-not-sending strategy
-
Towards a secure and dependable IoT data monetization using blockchain and fog computing
-
Secure data management – proceedings
-
Security and privacy in communication networks – 7th international ICST conference ; revised selected papers
-
Secure data management – proceedings
-
Design Methodologies for Secure Embedded Systems – Festschrift in Honor of Prof. Dr.-Ing. Sorin A. Huss
-
Design methodologies for secure embedded systems – Festschrift in Honor of Prof. Dr.-Ing. Sorin A. Huss
-
Cloud music resources-oriented secure data storage and defense using edge computing
-
Non-IID federated learning via random exchange of local feature maps for textile IIoT secure computing
-
Software Engineering 2020 – 24.-28. Februar 2020 Innsbruck, Austria
-
Attribute-based data access control scheme with secure revocation in fog computing for smart grid
-
An Efficient and Secure Vehicular Networks Based on IoT and Cloud Computing
-
A secure framework for IoT-based smart climate agriculture system: Toward blockchain and edge computing
-
Measurement-device-independent quantum secure multiparty summation
-
Privacy-preserving kNN query processing algorithms via secure two-party computation over encrypted database in cloud computing
-
Coin-based Secure Computations