Works matching IS 17518709 AND DT 2024 AND VI 2024
Results: 8
Functional Message Authentication Codes With Message and Function Privacy.
- Published in:
- IET Information Security (Wiley-Blackwell), 2024, v. 2024, p. 1, doi. 10.1049/ise2/1969519
- By:
- Publication type:
- Article
Lattice‐Based CP‐ABE for Optimal Broadcast Encryption With Polynomial‐Depth Circuits.
- Published in:
- IET Information Security (Wiley-Blackwell), 2024, v. 2024, p. 1, doi. 10.1049/ise2/6333508
- By:
- Publication type:
- Article
A Comprehensive Investigation of Anomaly Detection Methods in Deep Learning and Machine Learning: 2019–2023.
- Published in:
- IET Information Security (Wiley-Blackwell), 2024, v. 2024, p. 1, doi. 10.1049/2024/8821891
- By:
- Publication type:
- Article
Full‐Accessible Multiparty Searchable Encryption Scheme for Shared Cloud Storage.
- Published in:
- IET Information Security (Wiley-Blackwell), 2024, v. 2024, p. 1, doi. 10.1049/ise2/5693357
- By:
- Publication type:
- Article
A Trust Based Anomaly Detection Scheme Using a Hybrid Deep Learning Model for IoT Routing Attacks Mitigation.
- Published in:
- IET Information Security (Wiley-Blackwell), 2024, v. 2024, p. 1, doi. 10.1049/2024/4449798
- By:
- Publication type:
- Article
A New (Related‐Key) Neural Distinguisher Using Two Differences for Differential Cryptanalysis.
- Published in:
- IET Information Security (Wiley-Blackwell), 2024, v. 2024, p. 1, doi. 10.1049/2024/4097586
- By:
- Publication type:
- Article
A Novel Differentially Private Online Learning Algorithm for Group Lasso in Big Data.
- Published in:
- IET Information Security (Wiley-Blackwell), 2024, v. 2024, p. 1, doi. 10.1049/2024/5553292
- By:
- Publication type:
- Article
An Efficient Multiparty Threshold ECDSA Protocol against Malicious Adversaries for Blockchain‐Based LLMs.
- Published in:
- IET Information Security (Wiley-Blackwell), 2024, v. 2024, p. 1, doi. 10.1049/2024/2252865
- By:
- Publication type:
- Article