用户名  找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Cryptology and Network Security with Machine Learning; Proceedings of ICCNS Bimal Kumar Roy,Atul Chaturvedi,Sartaj Ul Hasan Conference proc

[复制链接]
查看: 46362|回复: 62
发表于 2025-3-21 19:31:30 | 显示全部楼层 |阅读模式
书目名称Cryptology and Network Security with Machine Learning
副标题Proceedings of ICCNS
编辑Bimal Kumar Roy,Atul Chaturvedi,Sartaj Ul Hasan
视频videohttp://file.papertrans.cn/241/240614/240614.mp4
概述Presents recent research in the field of cryptology and network security.Discusses the outcomes of ICCNSML 2022, held in Kanpur, India.Serves as a reference guide for researchers and practitioners in
丛书名称Algorithms for Intelligent Systems
图书封面Titlebook: Cryptology and Network Security with Machine Learning; Proceedings of ICCNS Bimal Kumar Roy,Atul Chaturvedi,Sartaj Ul Hasan Conference proc
描述The book features original papers from International Conference on Cryptology & Network Security with Machine Learning (ICCNSML 2022), organized by PSIT, Kanpur, India during 16 – 18 December 2022. This conference proceeding will provide the understanding of core concepts of Cryptology & Network Security with ML in data communication. The book covers research papers in public key cryptography, elliptic curve cryptography, post quantum cryptography, lattice based cryptography, non-commutative ring based cryptography, cryptocurrency, authentication, key agreement, Hash functions, block/stream ciphers, polynomial based cryptography, code based cryptography, NTRU cryptosystems, security and privacy in machine learning, block chain, IoT security, wireless security protocols, cryptanalysis, number theory, quantum computing, cryptographic aspects of network security, complexity theory, and cryptography with machine learning.
出版日期Conference proceedings 2024
关键词Public Key Cryptography; Elliptic Curve Cryptography; Post Quantum Cryptography; Lattice Based Cryptogr
版次1
doihttps://doi.org/10.1007/978-981-99-2229-1
isbn_softcover978-981-99-2231-4
isbn_ebook978-981-99-2229-1Series ISSN 2524-7565 Series E-ISSN 2524-7573
issn_series 2524-7565
copyrightThe Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapor
The information of publication is updating

书目名称Cryptology and Network Security with Machine Learning影响因子(影响力)




书目名称Cryptology and Network Security with Machine Learning影响因子(影响力)学科排名




书目名称Cryptology and Network Security with Machine Learning网络公开度




书目名称Cryptology and Network Security with Machine Learning网络公开度学科排名




书目名称Cryptology and Network Security with Machine Learning被引频次




书目名称Cryptology and Network Security with Machine Learning被引频次学科排名




书目名称Cryptology and Network Security with Machine Learning年度引用




书目名称Cryptology and Network Security with Machine Learning年度引用学科排名




书目名称Cryptology and Network Security with Machine Learning读者反馈




书目名称Cryptology and Network Security with Machine Learning读者反馈学科排名




单选投票, 共有 0 人参与投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用户组没有投票权限
发表于 2025-3-21 23:27:45 | 显示全部楼层
发表于 2025-3-22 01:58:24 | 显示全部楼层
,Cryptanalysis of Lattice-Based Threshold Changeable Multi-secret Sharing Scheme,hold value . of the SSS without reconstructing the secret. In 2017, H. Pilaram and T. Eghlidos gave a technique to change the threshold of their earlier proposed lattice-based multi-stage SSS. In this paper, we gave an attack on their threshold changeable technique. We also modified their threshold changeable technique to overcome this attack.
发表于 2025-3-22 06:58:39 | 显示全部楼层
发表于 2025-3-22 10:19:54 | 显示全部楼层
lt, this paper attempts to review recent progress in blockchain technology. Moreover, we investigated the various blockchain applications, as well as emphasised and investigated future directions of research as well as complexities.
发表于 2025-3-22 16:36:02 | 显示全部楼层
Springer Professional Computinges provides resilient infrastructure that is designed for high security, without the capital outlay and operational overhead of a traditional data center. The current manuscript reviews the security mechanism used for authentication of edge devices in AWS Internet of Things (IoT).
发表于 2025-3-22 21:07:45 | 显示全部楼层
Knowledge Discovery Using Web Bags,well as to minimize the re-transmission of the blocked packets, an input buffering scheme is considered. The Monte Carlo simulation is done to evaluate the packet loss performance of electronic and optical buffers. It has been found that the proposed buffering schemes improve the switch performance significantly.
发表于 2025-3-22 22:11:45 | 显示全部楼层
Predicates on Node and Link Objects, steganography is used to hide the encrypted message which is to be communicated. Various advantages along with the required analysis are done in order to show the overall effectiveness of the proposed method. In addition, the proposed method is also resistive against brute force, denial of service and man in the middle attack.
发表于 2025-3-23 02:58:23 | 显示全部楼层
发表于 2025-3-23 06:02:12 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 吾爱论文网 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
QQ|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-7-16 07:26
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表