放大 发表于 2025-3-23 09:58:31

https://doi.org/10.1007/978-3-658-42814-3ning coordinates participants collaboratively train a powerful global model. However, this process has several problems: it cannot meet the heterogeneous model’s requirements, and it cannot resist poisoning attacks and single-point-of-failure. In order to resolve these issues, we proposed a heteroge

类型 发表于 2025-3-23 15:28:32

Werkstattberichte aus der Praxis,ptosystem. Aiming at the security problem of an authentication key agreement protocol using certificateless aggregate signature in VANET, an improved certificateless authentication key agreement protocol based on elliptic curve is proposed, and then the security of the protocol is analyzed. The anal

arthroplasty 发表于 2025-3-23 21:12:53

,Der Konzeptions- und Einführungsprozess,) and the compensatory reconstruction attack (CRA) can reconstruct the training data according to the gradients uploaded by users. We propose an efficient federated convolutional neural network scheme with differential privacy to solve this problem. By adding Gaussian noise to the fully connected la

表两个 发表于 2025-3-23 23:06:26

Nachhaltigkeit als didaktische Kategorie, in different trust domains connect through blockchain technology. However, a single IDP in the domain is still at the risk of being compromised or corrupted. What’s more, users may create redundant identities for different services but can not dominate all their identities completely. Therefore, we

MORPH 发表于 2025-3-24 06:21:18

https://doi.org/10.1007/978-3-662-57693-9average temperature and the maximum humidity of an area. The existing privacy-preserving aggregation query algorithms depend on pre-established network topology, and maintaining network topology requires lots of energy. In addition, these algorithms assume that the nodes between the communication ra

MOT 发表于 2025-3-24 08:53:21

http://reply.papertrans.cn/31/3083/308271/308271_16.png

滔滔不绝的人 发表于 2025-3-24 11:44:08

978-3-031-23097-4The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerl

osculate 发表于 2025-3-24 15:37:03

http://reply.papertrans.cn/31/3083/308271/308271_18.png

放纵 发表于 2025-3-24 21:04:19

,Asymmetric Secure Multi-party Signing Protocol for the Identity-Based Signature Scheme in the IEEE e are various kinds of devices corresponding to diversified security requirements, it could be a worthwhile trade-off to preserve the secret key by signing in a multi-party setting. However, most multi-party setting solutions start with resetting their one-time secret subkey, which could be a potent

covert 发表于 2025-3-25 01:47:12

,A Multi-task Mobile Crowdsensing Scheme with Conditional Privacy Preserving for Vehicle Networks,sensing paradigm with low deploying costs. As the development of vehicle networks, many works in the literature have investigated how to use vehicles as the sensing units for mobile crowdsensing. However, the majority of these works suffer some limitations. First, they can either achieve privacy pre
页: 1 [2] 3 4 5 6
查看完整版本: Titlebook: Emerging Information Security and Applications; Third International Jiageng Chen,Debiao He,Rongxing Lu Conference proceedings 2022 The Edi