找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問(wèn)微社區(qū)

打印 上一主題 下一主題

Titlebook: Cryptology and Network Security with Machine Learning; Proceedings of ICCNS Bimal Kumar Roy,Atul Chaturvedi,Sartaj Ul Hasan Conference proc

[復(fù)制鏈接]
查看: 46462|回復(fù): 62
樓主
發(fā)表于 2025-3-21 19:31:30 | 只看該作者 |倒序?yàn)g覽 |閱讀模式
書目名稱Cryptology and Network Security with Machine Learning
副標(biāo)題Proceedings of ICCNS
編輯Bimal Kumar Roy,Atul Chaturvedi,Sartaj Ul Hasan
視頻videohttp://file.papertrans.cn/241/240614/240614.mp4
概述Presents recent research in the field of cryptology and network security.Discusses the outcomes of ICCNSML 2022, held in Kanpur, India.Serves as a reference guide for researchers and practitioners in
叢書名稱Algorithms for Intelligent Systems
圖書封面Titlebook: Cryptology and Network Security with Machine Learning; Proceedings of ICCNS Bimal Kumar Roy,Atul Chaturvedi,Sartaj Ul Hasan Conference proc
描述The book features original papers from International Conference on Cryptology & Network Security with Machine Learning (ICCNSML 2022), organized by PSIT, Kanpur, India during 16 – 18 December 2022. This conference proceeding will provide the understanding of core concepts of Cryptology & Network Security with ML in data communication. The book covers research papers in public key cryptography, elliptic curve cryptography, post quantum cryptography, lattice based cryptography, non-commutative ring based cryptography, cryptocurrency, authentication, key agreement, Hash functions, block/stream ciphers, polynomial based cryptography, code based cryptography, NTRU cryptosystems, security and privacy in machine learning, block chain, IoT security, wireless security protocols, cryptanalysis, number theory, quantum computing, cryptographic aspects of network security, complexity theory, and cryptography with machine learning.
出版日期Conference proceedings 2024
關(guān)鍵詞Public Key Cryptography; Elliptic Curve Cryptography; Post Quantum Cryptography; Lattice Based Cryptogr
版次1
doihttps://doi.org/10.1007/978-981-99-2229-1
isbn_softcover978-981-99-2231-4
isbn_ebook978-981-99-2229-1Series ISSN 2524-7565 Series E-ISSN 2524-7573
issn_series 2524-7565
copyrightThe Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapor
The information of publication is updating

書目名稱Cryptology and Network Security with Machine Learning影響因子(影響力)




書目名稱Cryptology and Network Security with Machine Learning影響因子(影響力)學(xué)科排名




書目名稱Cryptology and Network Security with Machine Learning網(wǎng)絡(luò)公開度




書目名稱Cryptology and Network Security with Machine Learning網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Cryptology and Network Security with Machine Learning被引頻次




書目名稱Cryptology and Network Security with Machine Learning被引頻次學(xué)科排名




書目名稱Cryptology and Network Security with Machine Learning年度引用




書目名稱Cryptology and Network Security with Machine Learning年度引用學(xué)科排名




書目名稱Cryptology and Network Security with Machine Learning讀者反饋




書目名稱Cryptology and Network Security with Machine Learning讀者反饋學(xué)科排名




單選投票, 共有 0 人參與投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用戶組沒有投票權(quán)限
沙發(fā)
發(fā)表于 2025-3-21 23:27:45 | 只看該作者
板凳
發(fā)表于 2025-3-22 01:58:24 | 只看該作者
,Cryptanalysis of?Lattice-Based Threshold Changeable Multi-secret Sharing Scheme,hold value . of the SSS without reconstructing the secret. In 2017, H. Pilaram and T. Eghlidos gave a technique to change the threshold of their earlier proposed lattice-based multi-stage SSS. In this paper, we gave an attack on their threshold changeable technique. We also modified their threshold changeable technique to overcome this attack.
地板
發(fā)表于 2025-3-22 06:58:39 | 只看該作者
5#
發(fā)表于 2025-3-22 10:19:54 | 只看該作者
lt, this paper attempts to review recent progress in blockchain technology. Moreover, we investigated the various blockchain applications, as well as emphasised and investigated future directions of research as well as complexities.
6#
發(fā)表于 2025-3-22 16:36:02 | 只看該作者
Springer Professional Computinges provides resilient infrastructure that is designed for high security, without the capital outlay and operational overhead of a traditional data center. The current manuscript reviews the security mechanism used for authentication of edge devices in AWS Internet of Things (IoT).
7#
發(fā)表于 2025-3-22 21:07:45 | 只看該作者
Knowledge Discovery Using Web Bags,well as to minimize the re-transmission of the blocked packets, an input buffering scheme is considered. The Monte Carlo simulation is done to evaluate the packet loss performance of electronic and optical buffers. It has been found that the proposed buffering schemes improve the switch performance significantly.
8#
發(fā)表于 2025-3-22 22:11:45 | 只看該作者
Predicates on Node and Link Objects, steganography is used to hide the encrypted message which is to be communicated. Various advantages along with the required analysis are done in order to show the overall effectiveness of the proposed method. In addition, the proposed method is also resistive against brute force, denial of service and man in the middle attack.
9#
發(fā)表于 2025-3-23 02:58:23 | 只看該作者
10#
發(fā)表于 2025-3-23 06:02:12 | 只看該作者
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國(guó)際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-16 04:39
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
林西县| 黔西| 宜宾县| 教育| 电白县| 鱼台县| 比如县| 山阳县| 盐源县| 西平县| 北票市| 社会| 杂多县| 娱乐| 天峨县| 北安市| 城固县| 类乌齐县| 黄梅县| 马边| 无棣县| 保定市| 大渡口区| 永修县| 铁岭县| 彭州市| 察雅县| 玉溪市| 太原市| 邹城市| 桂平市| 天水市| 高青县| 黄平县| 宕昌县| 昌黎县| 宁城县| 峨山| 自贡市| 英德市| 舟山市|