Search

Showing total 3,933 results
3,933 results

Search Results

1. Invited Paper: Secure Boot and Remote Attestation in the Sanctum Processor

2. Secret Writing on Dirty Paper: A Deterministic View.

3. Improving the Embedding Efficiency of Wet Paper Codes by Paper Folding.

4. Writing on wet paper.

5. Relative Generalized Hamming Weights of One-Point Algebraic Geometric Codes<xref ref-type="fn" rid="fn1">1</xref><fn id="fn1"><label>1</label><p>The paper is registered to the ORCID of Olav Geil. For more details please visit ...

6. Wet paper codes with improved embedding efficiency.

7. Privacy preserving mining of Association Rules on horizontally and vertically partitioned data: A review paper.

8. A Double Layered "Plus-Minus One" Data Embedding Scheme.

9. List of papers.

10. Using web conference system during the consultation hours.

11. Three-Dimensional Mesh Steganography and Steganalysis: A Review.

12. Timestamp Scheme to Mitigate Replay Attacks in Secure ZigBee Networks.

13. CrowdFA: A Privacy-Preserving Mobile Crowdsensing Paradigm via Federated Analytics.

14. Guest Editorial Physical Layer Security for 5G Wireless Networks, Part II.

15. Improved Bounds on Lossless Source Coding and Guessing Moments via Rényi Measures.

16. SDSS: Sequential Data Sharing System in IoT.

17. OLBS: Oblivious Location-Based Services.

18. DPCrypto: Acceleration of Post-Quantum Cryptography Using Dot-Product Instructions on GPUs.

19. Factorizations of Binomial Polynomials and Enumerations of LCD and Self-Dual Constacyclic Codes.

20. Secure Quaternion Feistel Cipher for DICOM Images.

21. Bounds on the Nonlinearity of Differentially Uniform Functions by Means of Their Image Set Size, and on Their Distance to Affine Functions.

22. Linear Codes From Some 2-Designs.

24. Engineering and Manufacturing on the Blockchain: A Systematic Review.

25. Real-Time Detection of Power Analysis Attacks by Machine Learning of Power Supply Variations On-Chip.

26. Ancillary Services in the Energy Blockchain for Microgrids.

27. The Wideband Slope of Interference Channels: The Small Bandwidth Case.

28. A New Full Chaos Coupled Mapping Lattice and Its Application in Privacy Image Encryption.

29. Construction of Sequences With High Nonlinear Complexity From Function Fields.

30. Binary Linear Codes With Few Weights From Two-to-One Functions.

31. Seek-and-Hide: Adversarial Steganography via Deep Reinforcement Learning.

32. GPSC: A Grid-Based Privacy-Reserving Framework for Online Spatial Crowdsourcing.

33. Multiplicative Complexity of XOR Based Regular Functions.

34. Detecting Steganography in JPEG Images Recompressed With the Same Quantization Matrix.

35. Revisiting Cryptanalysis on ChaCha From Crypto 2020 and Eurocrypt 2021.

36. Deep Learning and Onion Routing-Based Collaborative Intelligence Framework for Smart Homes Underlying 6G Networks.

37. Smart Card-Based Identity Management Protocols for V2V and V2I Communications in CCAM: A Systematic Literature Review.

38. Multi-Fogs-Based Traceable Privacy-Preserving Scheme for Vehicular Identity in Internet of Vehicles.

39. Enumeration of Extended Irreducible Binary Goppa Codes.

40. Efficient, Flexible, and Constant-Time Gaussian Sampling Hardware for Lattice Cryptography.

41. Physically Related Functions: Exploiting Related Inputs of PUFs for Authenticated-Key Exchange.

42. An Explainable AI-Based Intrusion Detection System for DNS Over HTTPS (DoH) Attacks.

43. Seeing Traffic Paths: Encrypted Traffic Classification With Path Signature Features.

44. Improving Cost Learning for JPEG Steganography by Exploiting JPEG Domain Knowledge.

45. Hardware Constructions for Error Detection of Number-Theoretic Transform Utilized in Secure Cryptographic Architectures.

46. $k$ Out of $n$ Region-Based Progressive Visual Cryptography.

47. Exploiting Oscillator Arrays As Randomness Sources for Cryptographic Applications.

48. Centralized Repair of Multiple Node Failures With Applications to Communication Efficient Secret Sharing.

49. Near-Optimal Codes for Information Embedding in Gray-Scale Signals.

50. Binary Linear Codes With Three Weights.