-
1
المؤلفون: William J Buchanan, Will Abramson, Adam James Hall, Pavlos Papadopoulos, Nikolaos Pitropakis
المصدر: Machine Learning and Knowledge Extraction, Vol 3, Iss 17, Pp 333-356 (2021)
Machine Learning and Knowledge Extraction
Volume 3
Issue 2
Pages 17-356مصطلحات موضوعية: FOS: Computer and information sciences, Computer Science - Machine Learning, Information privacy, Computer Science - Cryptography and Security, lcsh:Computer engineering. Computer hardware, Computer science, Data needs, 0211 other engineering and technologies, lcsh:TK7885-7895, 02 engineering and technology, Cyber-security, Machine learning, computer.software_genre, Machine Learning (cs.LG), Computer Science - Computers and Society, Health care, Computers and Society (cs.CY), Centre for Distributed Computing, Networking and Security, 0202 electrical engineering, electronic engineering, information engineering, decentralised identifiers, 021110 strategic, defence & security studies, federated learning, business.industry, trust, Possession (law), verifiable credentials, AI and Technologies, Highly sensitive, Workflow, machine learning, Computer Science - Distributed, Parallel, and Cluster Computing, Identity (object-oriented programming), 020201 artificial intelligence & image processing, Verifiable secret sharing, Artificial intelligence, Distributed, Parallel, and Cluster Computing (cs.DC), business, computer, Cryptography and Security (cs.CR)
وصف الملف: application/pdf; PDF
-
2
المؤلفون: Chen Keke, Sharma Sagar
المصدر: Cybersecurity
Cybersecurity, Vol 4, Iss 1, Pp 1-19 (2021)مصطلحات موضوعية: FOS: Computer and information sciences, Computer engineering. Computer hardware, Computer Science - Machine Learning, Computer Science - Cryptography and Security, Computer Networks and Communications, Computer science, Context (language use), Cryptography, Cryptographic protocols, Machine learning, computer.software_genre, Outsourcing, Machine Learning (cs.LG), TK7885-7895, 03 medical and health sciences, 0302 clinical medicine, Artificial Intelligence, Confidentiality, Survey, 030304 developmental biology, 0303 health sciences, business.industry, Collaborative learning, QA75.5-76.95, Cryptographic protocol, Service provider, Confidential computing, Electronic computers. Computer science, 030220 oncology & carcinogenesis, Threat model, Artificial intelligence, business, computer, Cryptography and Security (cs.CR), Software, Information Systems
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d64c2560d420d742133db6d44c771e04
-
3
المؤلفون: Xiaolu Hou, Yang Liu, Dirmanto Jap, Shivam Bhasin, Jakub Breier
المساهمون: School of Computer Science and Engineering, Temasek Laboratories @ NTU
مصطلحات موضوعية: Reverse engineering, FOS: Computer and information sciences, Computer Science - Machine Learning, Computer Science - Cryptography and Security, Artificial neural network, Computer science, Computer science and engineering::Computing methodologies::Artificial intelligence [Engineering], Reliability (computer networking), Fault Attacks, Sign bit, Computer science and engineering::Hardware::Performance and reliability [Engineering], Ranging, Fault injection, computer.software_genre, Fault (power engineering), Cryptography [Library and information science], Machine Learning (cs.LG), Deep Learning, Computer engineering, State (computer science), Electrical and Electronic Engineering, Safety, Risk, Reliability and Quality, computer, Cryptography and Security (cs.CR)
وصف الملف: application/pdf
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::493cd8b7e8644951ecda6d38c054c1a7
-
4
المصدر: Scopus-Elsevier
DLT@ITASEC
Annals of Emerging Technologies in Computing, Vol 3, Iss 5, Pp 25-33 (2019)مصطلحات موضوعية: Provable security, FOS: Computer and information sciences, Computer Science - Cryptography and Security, lcsh:Computer engineering. Computer hardware, Blockchain, General Computer Science, Discrete Mathematics (cs.DM), Computer science, Blockchain (BC), lcsh:TK7885-7895, Cryptography, 02 engineering and technology, Notarization, Computer security, computer.software_genre, lcsh:Technology, 0202 electrical engineering, electronic engineering, information engineering, blockchain (bc), provable security, Electrical and Electronic Engineering, notarization, Service (business), cryptography, lcsh:T, business.industry, 020208 electrical & electronic engineering, 020202 computer hardware & architecture, business, computer, Cryptography and Security (cs.CR), Computer Science - Discrete Mathematics
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::bfec29e50de2baf3057b3fd3d4a1d349
-
5
المصدر: Annals of Emerging Technologies in Computing, Vol 2, Iss 3, Pp 11-18 (2018)
مصطلحات موضوعية: Component, FOS: Computer and information sciences, lcsh:Computer engineering. Computer hardware, Computer Science - Cryptography and Security, General Computer Science, Wireless ad hoc network, Computer science, lcsh:TK7885-7895, 02 engineering and technology, Key management, Computer security, computer.software_genre, lcsh:Technology, 01 natural sciences, Computer Science - Networking and Internet Architecture, Certificate Authority, Distributed Certificate Management, Component (UML), Certificate authority, 0202 electrical engineering, electronic engineering, information engineering, Wireless, Electrical and Electronic Engineering, DCA, Networking and Internet Architecture (cs.NI), Authentication, lcsh:T, business.industry, 010401 analytical chemistry, ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS, 020206 networking & telecommunications, Public key infrastructure, 0104 chemical sciences, The Internet, business, computer, Cryptography and Security (cs.CR)
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ef1edf762ed86230d6f5b0ad25f06ad9
-
6
المؤلفون: Umakant Mishra
مصطلحات موضوعية: FOS: Computer and information sciences, Problem solver, Computer Science - Cryptography and Security, Computer science, computer.software_genre, law.invention, Computer virus, Anti virus, Computer engineering, law, False positive paradox, TRIZ, computer, Cryptography and Security (cs.CR), Simulation
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f7fd179420b12630127851fd89bb3862