


default search action
Computer Standards & Interfaces, Volume 89
Volume 89, 2024
- Yong Zhao

, Shao-Jun Yang
, Xinyi Huang:
Lattice-based dynamic universal accumulator: Design and application. 103807 - Burak Kolukisa

, Bilge Kagan Dedeturk
, Hilal Hacilar
, Vehbi Cagri Gungor
:
An efficient network intrusion detection approach based on logistic regression model and parallel artificial bee colony algorithm. 103808 - Zi-Yuan Liu

, Masahiro Mambo, Raylin Tso
, Yi-Fan Tseng
:
Anonymous hierarchical identity-based encryption with delegated traceability for cloud-based data sharing systems. 103817 - Chen Wang

, Jian Xu
, Shanru Tan, Long Yin:
Secure decision tree classification with decentralized authorization and access control. 103818 - Yuchen Xiao, Lei Zhang, Yafang Yang, Wei Wu

, Jianting Ning, Xinyi Huang
:
Provably secure multi-signature scheme based on the standard SM2 signature scheme. 103819 - Mingming Wang

, Qianhong Wu
:
Fast intensive validation on blockchain with scale-out dispute resolution. 103820 - Sha Ma, Zhiqing Ye, Qiong Huang

, Chengyu Jiang:
FFEC: Fast and forward-secure equivalence-based ciphertext comparability for multiple users in cloud environment. 103821 - Hongyu Yang

, Jinjiao Zhang, Liang Zhang
, Xiang Cheng, Ze Hu:
MRAN: Multimodal relationship-aware attention network for fake news detection. 103822 - Xiaopeng Yu, Dianhua Tang, Zhen Zhao

, Wei Zhao
:
Privacy-preserving compromised credential checking protocol for account protection. 103823 - Fanfan Shen, Lin Shi, Jun Zhang, Chao Xu, Yong Chen, Yanxiang He:

BMSE: Blockchain-based multi-keyword searchable encryption for electronic medical records. 103824 - Chi Liu

, Tianqing Zhu
, Yuan Zhao, Jun Zhang, Wanlei Zhou:
Disentangling different levels of GAN fingerprints for task-specific forensics. 103825 - Talha Umar

, Mohammad Nadeem
, Faisal Anwer:
A new modified Skew Tent Map and its application in pseudo-random number generator. 103826 - Mengmeng Yang

, Taolin Guo
, Tianqing Zhu, Ivan Tjuawinata, Jun Zhao, Kwok-Yan Lam:
Local differential privacy and its applications: A comprehensive survey. 103827 - Zhichuang Liang

, Boyue Fang
, Jieyu Zheng
, Yunlei Zhao:
Compact and efficient KEMs over NTRU lattices. 103828 - Lixia Xie, Bingdi Yuan, Hongyu Yang

, Ze Hu, Laiwei Jiang, Liang Zhang, Xiang Cheng:
MRFM: A timely detection method for DDoS attacks in IoT with multidimensional reconstruction and function mapping. 103829 - Huajie Chen

, Chi Liu
, Tianqing Zhu
, Wanlei Zhou:
When deep learning meets watermarking: A survey of application, attacks and defenses. 103830 - Ming Wu, Xiaohui Shen, Lekai Zhang

, Xingyu Liu, Hailong Zhang, Yaqi Hu:
A heuristic design toolkit for web conferencing software based on self-determination theory. 103831 - Eduardo B. Fernández

, Andrei Brazhuk
:
A critical analysis of Zero Trust Architecture (ZTA). 103832 - Shu Wu

, Aiqing Zhang, Ya Gao, Xiaojuan Xie:
Patient-centric medical service matching with fine-grained access control and dynamic user management. 103833 - Tao Li

, Peiyao Niu, Yilei Wang, Shengke Zeng, Xiaoying Wang, Willy Susilo
:
HT2REP: A fair cross-chain atomic exchange protocol under UC framework based on HTLCs and TRE. 103834 - Ricardo Colomo-Palacios:

Editorial. 103835

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














