Search

Showing total 3,491 results

Search Constraints

Start Over You searched for: Journal computer journal Remove constraint Journal: computer journal
3,491 results

Search Results

51. A Large-Scale Mobile Traffic Dataset For Mobile Application Identification.

52. Truncated Differential Attacks On Symmetric Primitives With Linear Key Schedule: WARP And Orthros.

53. KEFSAR: A Solar-Aware Routing Strategy For Rechargeable IoT Based On High-Accuracy Prediction.

54. Super Structure Fault-Tolerance Assessment of the Generalized Hypercube.

55. Improved Related-Key Rectangle Attacks On GIFT.

56. A Break Of Barrier To Classical Differential Fault Attack On The Nonce-Based Authenticated Encryption Algorithm.

57. Spatial-Aware Multi-Directional Autoencoder For Pre-Training.

58. A Genetic Algorithm Based Scheduling Method With Carrier Aggregation In 5G Networks.

59. A Toolbox for Migrating the Blockchain-Based Application From Ethereum to Hyperledger Fabric.

60. Pancyclic And Hamiltonian Properties Of Dragonfly Networks.

61. A Multiple QoS Metrics-Aware Virtual Network Embedding Algorithm.

62. Quantum Bit Commitment Without Quantum Memory.

63. Chronos: An Efficient Asynchronous Byzantine Ordered Consensus.

64. Analysis and Construction of Zero-Knowledge Proofs for the MinRank Problem.

65. A Publicly Verifiable Optimistic Fair Exchange Protocol Using Decentralized CP-ABE.

66. Decreasing Proof Size of BLS Scheme.

67. A White-box Implementation of SM4 with Self-equivalence Encoding.

68. Resilient Vector Consensus Over Random Dynamic Networks Under Mobile Malicious Attacks.

69. How To Bind A TPM's Attestation Keys With Its Endorsement Key.

70. Wearable Sensor-Based Human Activity Recognition System Employing Bi-LSTM Algorithm.

71. An Efficient Pending Interest Table Content Search In NDN through Stable Bloom Filter.

72. An e-Coin Based Construction for Unlinkable Priced Oblivious Transfer.

73. A General Condition of Structural Distinguisher.

74. Balanced Off-Chain Payment Channel Network Routing Strategy Based On Weight Calculation.

75. Cryptanalysis of Reduced-Round SipHash.

76. CD-BCM:Cross-Domain Batch Certificates Management Based On Blockchain.

77. Automating the Deployment of Cyber Range with OpenStack.

78. Extremely Lightweight Constant-Round Membership-Authenticated Group Key Establishment for Resource-Constrained Smart Environments toward 5G.

79. Worst-Case Analysis of Heapsort, Exactly.

80. A New Fuzzy Smoothing Term Model For Stereo Matching.

81. Mobility and Security Aware Real-Time Task Scheduling in Fog-Cloud Computing for IoT Devices: A Fuzzy-Logic Approach.

82. Finding Influencers in Complex Networks: An Effective Deep Reinforcement Learning Approach.

83. Compressed Zero-Knowledge Proofs for Lattice-Based Accumulator.

84. Reliability Evaluation Of Multiprocessor System Based On The Balanced Complete Multipartite Graphs.

85. Explicit Upper Bound Of Impossible Differentials For AES-Like Ciphers: Application To uBlock And Midori.

86. Providing an Approach for Early Prediction of Fall in Human Activities Based on Wearable Sensor Data and the Use of Deep Learning Algorithms.

87. Certificateless Broadcast Encryption with Authorization Suitable for Storing Personal Health Records.

88. Hitting Times of Random Walks on Edge Corona Product Graphs.

89. Improved (Related-Key) Differential-Based Neural Distinguishers for SIMON and SIMECK Block Ciphers.

90. Structure Fault Tolerance of Exchanged Hypercube.

91. Removing Watermarks For Image Processing Networks Via Referenced Subspace Attention.

92. Query Operators for Transactional Data: Detecting Similar and Periodic Transactions.

93. CSEA: A Fine-Grained Framework of Climate-Season-Based Energy-Aware in Cloud Storage Systems.

94. Perceptual Image Hashing Based on Canny Operator and Tensor for Copy-Move Forgery Detection.

95. Sentiment Classification of Tourist's Opinion on Tourist Places of Interest in South India using Tweet Reviews.

96. Efficient Parameter Server Placement for Distributed Deep Learning in Edge Computing.

97. Smart Multimedia Compressor—Intelligent Algorithms for Text and Image Compression.

98. Discussion of paper ‘Minimum Message Length and Kolmogorov Complexity’ by C. S. Wallace and D. L. Dowe.

99. Two-Dimensional Block Trees.

100. Encoding with Combination Orientation Technique for RDH in Dual Stego Images.