„Network Coding“
Suchergebnisse
3.793 Treffer
-
Advances in Cryptology – CRYPTO 2025 – 45th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17–21, 2025, Proceedings, Part VIII
-
Advances in Cryptology – CRYPTO 2025 – 45th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17–21, 2025, Proceedings, Part IV
-
Concise ID-based mercurial functional commitments and applications to zero-knowledge sets
-
Certificateless designated verifier signature revisited: achieving a concrete scheme in the standard model
-
Revisiting Cuckoo Hash-based Unbalanced Private Set Union: Leakage Analysis and Better Construction
-
Insights from field experience: digital forensics of event and voyage data recorders in transportation systems accident investigation
-
Lower bounds on the aperiodic Hamming correlation of low hit zone frequency hopping sequence sets with gaps
-
ShieldFlow: a novel framework for OT cybersecurity in the context of industry 4.0
-
Human-Computer Interaction – 9th Iberoamerican Workshop, HCI-COLLAB 2023, Buenos Aires, Argentina, September 13–15, 2023, Revised Selected Papers
-
Optimizing gas efficiency and enhancing security in Ethereum smart contracts through integrated clustering and anomaly detection
-
Hybrid attention-enhanced explainable model for encrypted traffic detection and classification
-
An Android malware detection based on reconstructed API with TextCNN
-
A dual-stage deep learning approach for robust detection and identification of hardware trojans using monte-carlo dropout
-
Verifiability for privacy-preserving computing on distributed data — a survey
-
Building a secure and efficient NFT marketplace: AI integration, lazy minting, and trustGuard
-
Telecom spam and scams in the 5G and artificial intelligence era: analyzing economic implications, technical challenges and global regulatory efforts
-
Cultivating skilled malware analysts: Clarification of practical malware dynamic analysis through interviews
-
The effect of hop-count modification attack on random walk-based SLP schemes developed for WSNs: a study
-
A conflict-aware active BLE state machine learning and state coverage-guided gray-box fuzz testing method
-
Cyber defense in OCPP for EV charging security risks