-
1
المؤلفون: Masahiro Mambo, Raylin Tso, Zi-Yuan Liu, Yi-Fan Tseng, Yu-Chi Chen
المصدر: IET Information Security, Vol 16, Iss 2, Pp 111-126 (2022)
مصطلحات موضوعية: lattice theory, Communication, Computer engineering. Computer hardware, cryptography, Computer Networks and Communications, business.industry, media_common.quotation_subject, QA75.5-76.95, Encryption, public key cryptography, TK7885-7895, Identity (philosophy), Electronic computers. Computer science, Sociology, business, Quantum, Software, Information Systems, media_common, cryptographic protocols
-
2
المؤلفون: Fenghao Xu, Kehuan Zhang, Shuaike Dong, Jiongyi Chen, Wei Sun
المصدر: IET Information Security, Vol 16, Iss 2, Pp 133-143 (2022)
مصطلحات موضوعية: authorisation, Computer engineering. Computer hardware, Third party, Computer Networks and Communications, Computer science, business.industry, Network security, Authorization, QA75.5-76.95, Computer security, computer.software_genre, internet of things, TK7885-7895, computer network security, Electronic computers. Computer science, Internet of Things, business, computer, Software, Information Systems
-
3
المؤلفون: Takanori Isobe, Kazuhiko Minematsu, Kosei Sakamoto, Fukang Liu, Rentaro Shiba
المصدر: IET Information Security, Vol 16, Iss 2, Pp 75-85 (2022)
مصطلحات موضوعية: Computer engineering. Computer hardware, cryptography, Computer Networks and Communications, business.industry, Computer science, private key cryptography, Cryptography, QA75.5-76.95, TK7885-7895, Electronic computers. Computer science, Applied mathematics, business, Software, Differential (mathematics), Information Systems
-
4
المؤلفون: Fırat Artuğer, Fatih Özkaynak
المصدر: Egyptian Informatics Journal, Vol 23, Iss 1, Pp 127-135 (2022)
مصطلحات موضوعية: Computer science, Random number generation, business.industry, Cryptography, QA75.5-76.95, Management Science and Operations Research, Encryption, Image encryption, Computer Science Applications, Image (mathematics), Computer engineering, Electronic computers. Computer science, Component (UML), Confusion and diffusion, Focus (optics), business, Block cipher, S-box, Nonlinearity, Information Systems
-
5
المؤلفون: Guo Xiaoyan, Jiawei Nian, Ping Wang, Haichang Gao
المصدر: IET Information Security, Vol 16, Iss 2, Pp 97-110 (2022)
مصطلحات موضوعية: Computer engineering. Computer hardware, CAPTCHA, security, text‐based, Computer Networks and Communications, Computer science, business.industry, Deep learning, deep learning, object detection, QA75.5-76.95, computer.software_genre, Object detection, TK7885-7895, Electronic computers. Computer science, Computer vision, Artificial intelligence, business, computer, Software, Information Systems
-
6
المؤلفون: Arslan Munir, Joonho Kong, Jisu Kwon
المصدر: IET Computers & Digital Techniques, Vol 16, Iss 1, Pp 29-43 (2022)
مصطلحات موضوعية: Lossless compression, field programmable gate array, Computer engineering. Computer hardware, accelerator, business.industry, Computer science, input sparsity, Resource constrained, Pattern recognition, QA75.5-76.95, Convolutional neural network, compression, TK7885-7895, Acceleration, Hardware and Architecture, Feature (computer vision), Compression (functional analysis), Electronic computers. Computer science, convolutional neural networks, Artificial intelligence, Electrical and Electronic Engineering, business, Software
-
7
المؤلفون: Neil Hernandez Gress, Hector G. Ceballos, Daniela A. Gomez-Cravioto, Ramon E. Diaz-Ramos, Jose Luis Preciado
المصدر: Journal of Big Data, Vol 9, Iss 1, Pp 1-31 (2022)
مصطلحات موضوعية: Computer engineering. Computer hardware, Information Systems and Management, Income prediction, Explainable Artificial Intelligence, business.industry, Computer science, Computer Networks and Communications, Alumni survey analysis, Information technology, QA75.5-76.95, Predictive analytics, Machine learning, computer.software_genre, Knowledge Discovery, T58.5-58.64, TK7885-7895, Hardware and Architecture, Electronic computers. Computer science, Artificial intelligence, business, computer, Information Systems
-
8
المؤلفون: Hua Guo, Rusi Wang, Jiqiang Lu, Jianwei Liu
المصدر: IET Information Security, Vol 16, Iss 1, Pp 18-27 (2022)
مصطلحات موضوعية: Computer engineering. Computer hardware, Computer Networks and Communications, Computer science, Cryptography, white‐box cryptography, Computer security, computer.software_genre, law.invention, TK7885-7895, Collision attack, law, SM4, digital rights management, Digital rights management, cryptography, business.industry, QA75.5-76.95, White box cryptography, Electronic computers. Computer science, collision attack, White box, Cryptanalysis, business, computer, Software, Information Systems
-
9
المؤلفون: Xiaoli Dong, Yongzhuang Wei
المصدر: IET Information Security, Vol 16, Iss 1, Pp 28-40 (2022)
مصطلحات موضوعية: TK7885-7895, Computer engineering. Computer hardware, Computer Networks and Communications, business.industry, Computer science, Electronic computers. Computer science, Advanced Encryption Standard, QA75.5-76.95, business, Software, Information Systems
-
10
المؤلفون: Pavel Laskov, Michele Russo, Nedim Srndic
المصدر: EURASIP Journal on Information Security, Vol 2021, Iss 1, Pp 1-20 (2021)
مصطلحات موضوعية: Computer engineering. Computer hardware, Information retrieval, business.industry, Computer science, QA75.5-76.95, Malware, Computer Science Applications, Metadata, TK7885-7895, Detection, Text mining, Monero, Electronic computers. Computer science, Signal Processing, Machine learning, NetFlow, business, Cryptomining
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ff442f5da15bf157b0eac49b84fa57a5
https://doaj.org/article/58a39e89dfcc4878b72917f3919e8eda