„Secure Computing“
Suchergebnisse
616 Treffer
-
Multi-agent deep reinforcement learning for RIS-assisted secure UAV communication
-
Secure and efficient quantum signature scheme based on the controlled unitary operations encryption
-
Quantum sealed-bid auction protocol based on secure multi-party sorting
-
Secure Delete Object Store - sicheres Löschen auf nicht vertrauenswürdigen Speichersystemen
-
SO-ITS: a secure offloading scheme for intelligent transportation systems in federated fog-cloud
-
All-day free-space quantum key distribution with thermal source towards quantum secure communications for unmanned vehicles
-
TREE: Bridging the gap between reconfigurable computing and secure execution
-
Introduction to Cryptography – Principles and Applications
-
A note on “an efficient and provably secure authenticated key agreement scheme for mobile edge computing”
-
Transactions on Large-Scale Data- and Knowledge-Centered Systems XXXIX – Special Issue on Database- and Expert-Systems Applications
-
Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments – First International Conference, ISDDC 2017, Vancouver, BC, Canada, October 26-28, 2017, Proceedings
-
Financial Cryptography and Data Security – FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers
-
Theory of Cryptography – 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I
-
Security and Trust Management – 13th International Workshop, STM 2017, Oslo, Norway, September 14–15, 2017, Proceedings
-
An insight towards trustworthy cloud computing: enabling restricted access control and secure service transactions using Ethereum blockchain
-
Gaussian-modulated coherent-state quantum secure direct communication and its security analysis
-
BEHSMD: enhanced Handle System through blockchain to secure social media data
-
Next-generation ant-inspired cryptography for secure and resilient decentralized IoT ecosystems
-
SDASS: secure data auditing for sharing matrix based secret share cloud storage supporting data dynamics
-
Quantum-secured cloud communications in 6G networks: an advanced key shifting model with mutual identity authentication for optimal performance in time-constrained environments