Nothing Special   »   [go: up one dir, main page]

skip to main content
Reflects downloads up to 14 Feb 2025Bibliometrics
Skip Table Of Content Section
research-article
Identity-based chameleon hash from lattices

Identity-based chameleon hash (IBCH) is a cryptographic primitive with nice properties. IBCH equips each user with a trapdoor and the hash values can be publicly evaluated w.r.t. the identity of any user. On the one hand, it is hard to find collisions ...

research-article
MVDet: Encrypted malware traffic detection via multi-view analysis

Detecting encrypted malware traffic promptly to halt the further propagation of an attack is critical. Currently, machine learning becomes a key technique for extracting encrypted malware traffic patterns. However, due to the dynamic nature of network ...

research-article
Adaptive multi-cascaded ResNet-based efficient multimedia steganography framework using hybrid mouth brooding fish-emperor penguin optimization mechanism

A massive amount of data is transmitted in the Internet of Things (IoT). Nowadays, the concerning of security issues are the major factor while transferring data through wireless networks. Since, data privacy becomes complicated. In this research work, a ...

Comments

Please enable JavaScript to view thecomments powered by Disqus.