OPEN ACCESS
- Reusable and robust fuzzy extractor for CRS-dependent sources
- Cryptanalysis of IAR-CTR and IAR-CFB and a fixing method
- The SEIRS-NIMFA epidemiological model for malware propagation analysis in IoT networks
- A graph backdoor detection method for data collection scenarios
- A novel approach for detecting malicious hosts based on RE-GCN in intranet
- A survey on the application of blockchain in cryptographic protocols
- UDAP: ultra-lightweight dot product-based authentication protocol for RFID systems
- Dual-verification-based model fingerprints against ambiguity attacks
- Fedrtid: an efficient shuffle federated learning via random participation and adaptive time constraint
- Designated confirmer threshold signature and its applications in blockchains
- Analysis on dendritic deep learning model for AMR task
- Enabling per-file data recovery from ransomware attacks via file system forensics and flash translation layer data extraction
- Double-sided: tight proofs for guessing games in the quantum random oracle model
- Lattice-based cryptanalysis of RSA-type cryptosystems: a bibliometric analysis
- Improved integral neural distinguisher model for lightweight cipher PRESENT
- A Robust joint coverless image steganography scheme based on two independent modules
- Renyi entropy-driven network traffic anomaly detection with dynamic threshold
- The quantum circuit implementation and feasibility analysis of quantum public-key cryptosystem based on the (QSCD_{ff}) problem
- An efficient and versatile e-voting scheme on blockchain
- Mi-maml: classifying few-shot advanced malware using multi-improved model-agnostic meta-learning
- Enhanced reversible data hiding using difference expansion and modulus function with selective bit blocks in images
- Enhanced anomaly traffic detection framework using BiGAN and contrastive learning
- Simultaneously resettable zero knowledge protocol in Public Key model
- A new S-box pattern generation based on chaotic enhanced logistic map: case of 5-bit S-box
- A proactive defense method against eavesdropping attack in SDN-based storage environment
- Securing transactions: a hybrid dependable ensemble machine learning model using IHT-LR and grid search
- Revisiting the shuffle of generalized Feistel structure
- Research on distribution automation security situational awareness technology based on risk transmission path and multi-source information fusion
- Telemedicine data secure sharing scheme based on heterogeneous federated learning
- MVD-HG: multigranularity smart contract vulnerability detection method based on heterogeneous graphs
- Honey password vaults tolerating leakage of both personally identifiable information and passwords
- Discovering API usage specifications for security detection using two-stage code mining
- GAPS: GPU-accelerated processing service for SM9
- Break-Pad: effective padding machines for tor with break burst padding
- Optimum noise mechanism for differentially private queries in discrete finite sets
- Cloud EMRs auditing with decentralized (t, n)-threshold ownership transfer
- SIFT: Sifting file types—application of explainable artificial intelligence in cyber forensics
- Modelling user notification scenarios in privacy policies
- FLSec-RPL: a fuzzy logic-based intrusion detection scheme for securing RPL-based IoT networks against DIO neighbor suppression attacks
- New partial key exposure attacks on RSA with additive exponent blinding
- Dynamic group fuzzy extractor
- EvilPromptFuzzer: generating inappropriate content based on text-to-image models
- ProcSAGE: an efficient host threat detection method based on graph representation learning
- Lightweight ring-neighbor-based user authentication and group-key agreement for internet of drones
- A multi-channel spatial information feature based human pose estimation algorithm
- TVRAVNF: an efficient low-cost TEE-based virtual remote attestation scheme for virtual network functions
- Efficient post-quantum secure deterministic wallet scheme
- Classification of DDoS attack traffic on SDN network environment using deep learning
- Revisiting frequency-smoothing encryption: new security definitions and efficient construction
- GLDOC: detection of implicitly malicious MS-Office documents using graph convolutional networks
- Revealing the exploitability of heap overflow through PoC analysis
- Threshold ring signature: generic construction and logarithmic size instantiation
- FedSHE: privacy preserving and efficient federated learning with adaptive segmented CKKS homomorphic encryption
- A privacy-preserving image retrieval scheme with access control based on searchable encryption in media cloud
ABSTRACT
Coming soon