Showing 92 - 104 of 226
View by: Cover Page List Articles
-
A novel privacy-preserving biometric authentication scheme
published 25 May 2023
Loading metrics information...
Metrics unavailable. Please check back later.
-
P/Key: PUF based second factor authentication
published 09 Feb 2023
Loading metrics information...
Metrics unavailable. Please check back later.
-
Information sharing and deferral option in cybersecurity investment
published 06 Feb 2023
Loading metrics information...
Metrics unavailable. Please check back later.
-
Multi-party co-signature scheme based on SM2
published 06 Feb 2023
Loading metrics information...
Metrics unavailable. Please check back later.
-
Domain generation algorithms detection with feature extraction and Domain Center construction
published 27 Jan 2023
Loading metrics information...
Metrics unavailable. Please check back later.
-
A security testing mechanism for detecting attacks in distributed software applications using blockchain
published 20 Jan 2023
Loading metrics information...
Metrics unavailable. Please check back later.
-
Population processes in cyber system variability
published 27 Dec 2022
Loading metrics information...
Metrics unavailable. Please check back later.
-
Android malware detection method based on highly distinguishable static features and DenseNet
published 23 Nov 2022
Loading metrics information...
Metrics unavailable. Please check back later.
-
Computer cyberspace security mechanism supported by cloud computing
published 07 Oct 2022
Loading metrics information...
Metrics unavailable. Please check back later.
-
Improved anonymity preserving three-party mutual authentication key exchange protocol based on chaotic maps
published 16 Sep 2022
Loading metrics information...
Metrics unavailable. Please check back later.
-
MalFuzz: Coverage-guided fuzzing on deep learning-based malware classification model
published 15 Sep 2022
Loading metrics information...
Metrics unavailable. Please check back later.
-
Cryptanalysis and improved mutual authentication key agreement protocol using pseudo-identity
published 28 Jul 2022
Loading metrics information...
Metrics unavailable. Please check back later.
-
Modeling and verification of authentication threats mitigation in aspect-oriented mal sequence woven model
published 06 Jul 2022
Loading metrics information...
Metrics unavailable. Please check back later.
Connect with Us