Search Results - "Proceedings of the ... ACM Conference on Computer and Communications Security"
-
1
Authors:
Source: Computational soundness without protocol restrictions..
-
2
Authors:
Source: Computationally sound verification of source code.
-
3
Authors: et al.
Source: Proceedings of the ACM Conference on Computer and Communications Security. 2014-November(November)
Access URL: https://research.chalmers.se/publication/236427
-
4
Authors: et al.
Source: 6th Annual ACM Workshop on Artificial Intelligence and Security, AISec 2013, Co-located with the 20th ACM Conference on Computer and Communications Security, CCS 2013, Berlin, Germany, 4 November 2013.
Access URL: https://research.chalmers.se/publication/189923
-
5
Authors: et al.
Contributors: et al.
Source: Wu, M, Yuen, T H & Yiu, S M 2025, Efficient Private Set Intersection by Utilizing Oblivious Transfer Extension. in D Tien Tuan Anh & T Van Van (eds), Proceedings of the 20th ACM ASIA Conference on Computer and Communications Security. Proceedings of the ACM Conference on Computer and Communications Security, Association for Computing Machinery (ACM), New York NY USA, pp. 104-117, ACM ASIA Conference on Computer and Communications Security 2025, Hanoi, Vietnam, 25/08/25. https://doi.org/10.1145/3708821.3733886
Subject Terms: Oblivious key-value store, Oblivious pseudorandom function, Oblivious transfer extension, Private set intersection
File Description: application/pdf
Relation: urn:ISBN:9798400714108
-
6
Authors:
Source: Shamshad, S, Belguith, S & Oracevic, A 2025, A Quantum-Secure Framework for IoD : Strengthening Authentication and Key-Establishment. in ACM ASIA CCS 2025 - Proceedings of the 20th ACM ASIA Conference on Computer and Communications Security. Proceedings of the ACM Conference on Computer and Communications Security, Association for Computing Machinery, pp. 313-326, 20th ACM ASIA Conference on Computer and Communications Security, ASIA CCS 2025, Hanoi, Viet Nam, 25/08/25. https://doi.org/10.1145/3708821.3736219
Subject Terms: Authentication, CRYSTAL-Kyber, Key Establishment, Mutual Authentication, Post-Quantum Cryptography
Relation: urn:ISBN:9798400714108
-
7
Authors: et al.
Contributors: et al.
Source: Proceedings of the ACM Conference on Computer and Communications Security
Subject Terms: adversarial machine learning, autonomous driving, neural networks, object tracking, video surveillance
Relation: http://hdl.handle.net/10150/670382; Proceedings of the ACM Conference on Computer and Communications Security
-
8
-
9
-
10
-
11
-
12
-
13
Authors: et al.
-
14
Authors:
Source: Artificial Intelligence Review; Dec2025, Vol. 58 Issue 12, p1-59, 59p
-
15
Authors:
Source: International Journal of Networked & Distributed Computing; Dec2025, Vol. 13 Issue 2, p1-21, 21p
-
16
Authors: et al.
Source: Visual Computer; Dec2025, Vol. 41 Issue 15, p12917-12933, 17p
Subject Terms: DATA security, ARTIFICIAL neural networks
-
17
Authors: et al.
Source: Scientific Reports; 12/1/2025, Vol. 15 Issue 1, p1-32, 32p
Subject Terms: PHISHING, INTERNET security, ARTIFICIAL neural networks, MACHINE learning, FEATURE selection
-
18
Authors:
Source: Scientific Reports; 11/28/2025, Vol. 15 Issue 1, p1-14, 14p
-
19
Authors: et al.
Source: Applied Sciences (2076-3417); Nov2025, Vol. 15 Issue 22, p11991, 36p
-
20
Authors: et al.
Source: Electronics (2079-9292); Nov2025, Vol. 14 Issue 22, p4441, 27p
Nájsť tento článok vo Web of Science
Full Text Finder