„Data Encryption.“
Suchergebnisse
7.742 Treffer
-
Revisiting Cuckoo Hash-based Unbalanced Private Set Union: Leakage Analysis and Better Construction
-
Advances in Cryptology – EUROCRYPT 2017 – 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part III
-
Advances in Cryptology – EUROCRYPT 2017 – 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part I
-
Topics in Cryptology – CT-RSA 2017 – The Cryptographers’ Track at the RSA Conference 2017, San Francisco, CA, USA, February 14–17, 2017, Proceedings
-
Advances in Cryptology – EUROCRYPT 2017 – 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part II
-
Insights from field experience: digital forensics of event and voyage data recorders in transportation systems accident investigation
-
Advances in Cryptology – ASIACRYPT 2017 – 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part II
-
Provable Security – 12th International Conference, ProvSec 2018, Jeju, South Korea, October 25-28, 2018, Proceedings
-
Advances in Cryptology – ASIACRYPT 2018 – 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part III
-
A simple inner-product functional encryption scheme from the inverse-DDH assumption
-
ShieldFlow: a novel framework for OT cybersecurity in the context of industry 4.0
-
Codes on weighted projective planes
-
On generalizations of the Lai–Massey scheme
-
Steiner quadruple systems with minimum colorable derived designs: constructions and applications
-
Optimizing gas efficiency and enhancing security in Ethereum smart contracts through integrated clustering and anomaly detection
-
Hybrid attention-enhanced explainable model for encrypted traffic detection and classification
-
An Android malware detection based on reconstructed API with TextCNN
-
A dual-stage deep learning approach for robust detection and identification of hardware trojans using monte-carlo dropout
-
Verifiability for privacy-preserving computing on distributed data — a survey
-
Building a secure and efficient NFT marketplace: AI integration, lazy minting, and trustGuard