Found: 29
Select item for more details and to access through your institution.
Threshold ring signature: generic construction and logarithmic size instantiation.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00233-9
- By:
- Publication type:
- Article
FedSHE: privacy preserving and efficient federated learning with adaptive segmented CKKS homomorphic encryption.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00232-w
- By:
- Publication type:
- Article
A privacy-preserving image retrieval scheme with access control based on searchable encryption in media cloud.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00213-z
- By:
- Publication type:
- Article
Improved homomorphic evaluation for hash function based on TFHE.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00204-0
- By:
- Publication type:
- Article
An empirical study of reflection attacks using NetFlow data.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-023-00203-7
- By:
- Publication type:
- Article
Phishing behavior detection on different blockchains via adversarial domain adaptation.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00237-5
- By:
- Publication type:
- Article
Ensemble learning based anomaly detection for IoT cybersecurity via Bayesian hyperparameters sensitivity analysis.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00238-4
- By:
- Publication type:
- Article
CommanderUAP: a practical and transferable universal adversarial attacks on speech recognition models.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00218-8
- By:
- Publication type:
- Article
Enhancing fairness of trading environment: discovering overlapping spammer groups with dynamic co-review graph optimization.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00230-y
- By:
- Publication type:
- Article
In-depth Correlation Power Analysis Attacks on a Hardware Implementation of CRYSTALS-Dilithium.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00209-9
- By:
- Publication type:
- Article
Atomic cross-chain swap based on private key exchange.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-023-00202-8
- By:
- Publication type:
- Article
HSS: enhancing IoT malicious traffic classification leveraging hybrid sampling strategy.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-023-00201-9
- By:
- Publication type:
- Article
Key derivable signature and its application in blockchain stealth address.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00231-x
- By:
- Publication type:
- Article
Polar code-based secure transmission with higher message rate combining channel entropy and computational entropy.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00229-5
- By:
- Publication type:
- Article
Dissecting zero trust: research landscape and its implementation in IoT.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00212-0
- By:
- Publication type:
- Article
Study of smart grid cyber-security, examining architectures, communication networks, cyber-attacks, countermeasure techniques, and challenges.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-023-00200-w
- By:
- Publication type:
- Article
Iterative and mixed-spaces image gradient inversion attack in federated learning.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00227-7
- By:
- Publication type:
- Article
Winternitz stack protocols for embedded systems and IoT.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00225-9
- By:
- Publication type:
- Article
DTA: distribution transform-based attack for query-limited scenario.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-023-00197-2
- By:
- Publication type:
- Article
A survey on lattice-based digital signature.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-023-00198-1
- By:
- Publication type:
- Article
Shorter ZK-SNARKs from square span programs over ideal lattices.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00215-x
- By:
- Publication type:
- Article
Revocable and verifiable weighted attribute-based encryption with collaborative access for electronic health record in cloud.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00211-1
- By:
- Publication type:
- Article
Maxwell's Demon in MLP-Mixer: towards transferable adversarial attacks.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-023-00196-3
- By:
- Publication type:
- Article
Practical solutions in fully homomorphic encryption: a survey analyzing existing acceleration methods.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-023-00187-4
- By:
- Publication type:
- Article
Intrusion detection system for controller area network.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-023-00195-4
- By:
- Publication type:
- Article
CT-GCN+: a high-performance cryptocurrency transaction graph convolutional model for phishing node classification.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-023-00194-5
- By:
- Publication type:
- Article
Enhanced detection of obfuscated malware in memory dumps: a machine learning approach for advanced cybersecurity.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00205-z
- By:
- Publication type:
- Article
BRITD: behavior rhythm insider threat detection with time awareness and user adaptation.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-023-00190-9
- By:
- Publication type:
- Article
F3l: an automated and secure function-level low-overhead labeled encrypted traffic dataset construction method for IM in Android.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-023-00185-6
- By:
- Publication type:
- Article