Search

Your search keyword '"Janaka Alawatugoda"' showing total 67 results

Search Constraints

Start Over You searched for: Author "Janaka Alawatugoda" Remove constraint Author: "Janaka Alawatugoda"
67 results on '"Janaka Alawatugoda"'

Search Results

1. A novel ECG compression algorithm using Pulse-Width Modulation integrated quantization for low-power real-time monitoring

2. Analyzing transportation mode interactions using agent-based models

3. A new frontier in streamflow modeling in ungauged basins with sparse data: A modified generative adversarial network with explainable AI

4. Water desalination using PSO-ANN techniques: A critical review

5. Mixed-Reality Based Multi-Agent Robotics Framework for Artificial Swarm Intelligence Experiments

6. Unveiling Copy-Move Forgeries: Enhancing Detection With SuperPoint Keypoint Architecture

7. Robust Cross Directional Controller Design for Paper Machine Spatial Distributed System

8. Peer-to-Peer Energy Trading through Swarm Intelligent Stackelberg Game

9. Authenticated Key Exchange Protocol in the Standard Model under Weaker Assumptions

10. On Advances of Lattice-Based Cryptographic Schemes and Their Implementations

29. Review on Leakage Resilient Key Exchange Security Model

31. A Review of the NIST Lightweight Cryptography Finalists and Their Fault Analyses

36. BAT—Block Analytics Tool Integrated with Blockchain Based IoT Platform

40. Analysis of Four Historical Ciphers Against Known Plaintext Frequency Statistical Attack

41. Generic construction of an $$\mathrm {eCK}$$ eCK -secure key exchange protocol in the standard model

42. Implementing a proven-secure and cost-effective countermeasure against the compression ratio info-leak mass exploitation (CRIME) attack

43. Leakage-Resilient Non-interactive Key Exchange in the Continuous-Memory Leakage Setting

44. Leakage-resilient storage scheme for cryptographic applications

45. On Power Analysis Attacks against Hardware Stream Ciphers

46. Implementation of an eCK-secure Key Exchange Protocol for OpenSSL

47. Protecting Encrypted Cookies from Compression Side-Channel Attacks

48. Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange

49. Modelling after-the-fact leakage for key exchange

50. Software implementation level countermeasures against the cache timing attack on advanced encryption standard

Catalog

Books, media, physical & digital resources