OPEN ACCESS
- Simultaneously resettable zero knowledge protocol in Public Key model
- A new S-box pattern generation based on chaotic enhanced logistic map: case of 5-bit S-box
- A proactive defense method against eavesdropping attack in SDN-based storage environment
- Securing transactions: a hybrid dependable ensemble machine learning model using IHT-LR and grid search
- Revisiting the shuffle of generalized Feistel structure
- Research on distribution automation security situational awareness technology based on risk transmission path and multi-source information fusion
- Telemedicine data secure sharing scheme based on heterogeneous federated learning
- MVD-HG: multigranularity smart contract vulnerability detection method based on heterogeneous graphs
- Honey password vaults tolerating leakage of both personally identifiable information and passwords
- Discovering API usage specifications for security detection using two-stage code mining
- GAPS: GPU-accelerated processing service for SM9
- Break-Pad: effective padding machines for tor with break burst padding
- Optimum noise mechanism for differentially private queries in discrete finite sets
- Cloud EMRs auditing with decentralized (t, n)-threshold ownership transfer
- SIFT: Sifting file types—application of explainable artificial intelligence in cyber forensics
- Modelling user notification scenarios in privacy policies
- FLSec-RPL: a fuzzy logic-based intrusion detection scheme for securing RPL-based IoT networks against DIO neighbor suppression attacks
- New partial key exposure attacks on RSA with additive exponent blinding
- Dynamic group fuzzy extractor
- EvilPromptFuzzer: generating inappropriate content based on text-to-image models
- ProcSAGE: an efficient host threat detection method based on graph representation learning
- Lightweight ring-neighbor-based user authentication and group-key agreement for internet of drones
- A multi-channel spatial information feature based human pose estimation algorithm
- TVRAVNF: an efficient low-cost TEE-based virtual remote attestation scheme for virtual network functions
- Efficient post-quantum secure deterministic wallet scheme
- Classification of DDoS attack traffic on SDN network environment using deep learning
- Revisiting frequency-smoothing encryption: new security definitions and efficient construction
- GLDOC: detection of implicitly malicious MS-Office documents using graph convolutional networks
- Revealing the exploitability of heap overflow through PoC analysis
- Threshold ring signature: generic construction and logarithmic size instantiation
- FedSHE: privacy preserving and efficient federated learning with adaptive segmented CKKS homomorphic encryption
- A privacy-preserving image retrieval scheme with access control based on searchable encryption in media cloud
ABSTRACT
Coming soon