Item request has been placed! ×
Item request cannot be made. ×
loading  Processing Request

نتائج البحث

Filter
  • 1-10 ل  12 نتائج ل ""Security protocols""
Item request has been placed! ×
Item request cannot be made. ×
loading  Processing Request
Conference

Let Them Drop: Scalable and Efficient Federated Learning Solutions Agnostic to Stragglers

Subjects: Attribute-Based Encryption; Time-based Access Control; Direct RevocationVienna; Austria

  • Source: ACM Digital Library ; ARES 2024 - 19th International Conference on Availability, Reliability and Security ; https://hal.science/hal-04742784 ; ARES 2024 - 19th

تفاصيل العنوان

×
Conference

MATRaCAE: Time-based Revocable Access Control in the IoT

Subjects: Attribute-Based Encryption; Time-based Access Control; Direct RevocationDijon; France

  • Source: SECRYPT 2024 - 21st International Conference on Security and Cryptography ; https://hal.science/hal-04742788 ; SECRYPT 2024 - 21st International Conference on

تفاصيل العنوان

×
Conference

Key-Recovery by Side-Channel Information on the Matrix-Vector Product in Code-Based Cryptosystems

Subjects: Code-Based Cryptography; Side-Channel Attack; MatrixVector Product ProblemSéoul; South Korea

  • Source: Lecture Notes in Computer Science ; 25th International Conference on Information Security and Cryptology (ICISC 2022) ; https://hal.science/hal-04059124 ; 25th

تفاصيل العنوان

×
Conference

Privacy Risk Analysis to Enable Informed Privacy Settings

Subjects: Privacy settings; Privacy risk analysis; Harm treesLondon; United Kingdom

  • Source: IWPE 2018 – 4th IEEE International Workshop on Privacy Engineering ; https://hal.science/hal-01939845 ; IWPE 2018 – 4th IEEE International Workshop on Privacy Engineering, Apr 2018, London, United

تفاصيل العنوان

×
Dissertation/ Thesis

Study and analysis of the implementation of code-based cryptosystems ; Etude et analyse de cryptosystèmes basés sur les codes correcteurs implantables en pratique

Subjects: Post-quantum cryptography; Error correcting codes; Hidden channel attacks

  • Source: https://theses.hal.science/tel-04517248 ; Cryptographie et sécurité [cs.CR]. Université Jean Monnet - Saint-Etienne; ESP (Ecole Supérieure Polytechnique de Dakar), 2023. Français. ⟨NNT :

تفاصيل العنوان

×
Conference

New Paradigms for Access Control in Constrained Environments

Subjects: Internet of things (IoT); PHYSICAL UNCLONABLE FUNCTIONS; TERO-PUFMontpellier; France

  • Source: IEEE Xplore ; Proceedings of the 9th International Symposium on Reconfigurable communication-centric Systems-on-Chip ; 9th International Symposium on Reconfigurable Communication-centric

تفاصيل العنوان

×
  • 1-10 ل  12 نتائج ل ""Security protocols""