找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Cryptology and Network Security with Machine Learning; Proceedings of ICCNS Atul Chaturvedi,Sartaj Ul Hasan,Boaz Tsaban Conference proceedi

[复制链接]
查看: 10375|回复: 65
发表于 2025-3-21 16:12:09 | 显示全部楼层 |阅读模式
书目名称Cryptology and Network Security with Machine Learning
副标题Proceedings of ICCNS
编辑Atul Chaturvedi,Sartaj Ul Hasan,Boaz Tsaban
视频video
概述Presents recent research in the field of cryptology and network security.Discusses the outcomes of ICCNSML 2023, held in Kanpur, India.Serves as a reference guide for researchers and practitioners in
丛书名称Lecture Notes in Networks and Systems
图书封面Titlebook: Cryptology and Network Security with Machine Learning; Proceedings of ICCNS Atul Chaturvedi,Sartaj Ul Hasan,Boaz Tsaban Conference proceedi
描述.The book features original papers from International Conference on Cryptology & Network Security with Machine Learning (ICCNSML 2023), organized by PSIT, Kanpur, India during 27–29 October 2023. This conference proceeding provides the understanding of core concepts of Cryptology and Network Security with ML in data communication. The book covers research papers in public key cryptography, elliptic curve cryptography, post-quantum cryptography, lattice based cryptography, non-commutative ring-based cryptography, cryptocurrency, authentication, key agreement, Hash functions, block/stream ciphers, polynomial-based cryptography, code-based cryptography, NTRU cryptosystems, security and privacy in machine learning, blockchain, IoT security, wireless security protocols, cryptanalysis, number theory, quantum computing, cryptographic aspects of network security, complexity theory, and cryptography with machine learning..
出版日期Conference proceedings 2024
关键词Public Key Cryptography; Elliptic Curve Cryptography; Post Quantum Cryptography; Lattice Based Cryptogr
版次1
doihttps://doi.org/10.1007/978-981-97-0641-9
isbn_softcover978-981-97-0640-2
isbn_ebook978-981-97-0641-9Series ISSN 2367-3370 Series E-ISSN 2367-3389
issn_series 2367-3370
copyrightThe Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapor
The information of publication is updating

书目名称Cryptology and Network Security with Machine Learning影响因子(影响力)




书目名称Cryptology and Network Security with Machine Learning影响因子(影响力)学科排名




书目名称Cryptology and Network Security with Machine Learning网络公开度




书目名称Cryptology and Network Security with Machine Learning网络公开度学科排名




书目名称Cryptology and Network Security with Machine Learning被引频次




书目名称Cryptology and Network Security with Machine Learning被引频次学科排名




书目名称Cryptology and Network Security with Machine Learning年度引用




书目名称Cryptology and Network Security with Machine Learning年度引用学科排名




书目名称Cryptology and Network Security with Machine Learning读者反馈




书目名称Cryptology and Network Security with Machine Learning读者反馈学科排名




单选投票, 共有 0 人参与投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用户组没有投票权限
发表于 2025-3-21 20:30:58 | 显示全部楼层
Blockchain Technology in Health-Care Sector: A Review,t need to be tackled, such as mine incentive, extracting attacks, and key managing. This assessment found, however, that many of the requirements of smart health care were not being met by some of the blockchain initiatives under study. Possible future research directions are also discussed in this
发表于 2025-3-22 01:21:59 | 显示全部楼层
Real-Time Authenticated and Secure Monitoring and Control of Low-Cost Sustainable Hydroponic Systemm and its environment and store it in a cloud database. Our goal is to create a web application utilizing Google Firebase that allows the farmer to see and alter elements such as temperature and pH with a single click in real-time.
发表于 2025-3-22 04:33:29 | 显示全部楼层
A Note on 5G Networks: Security Issues, Challenges and Connectivity Approaches,fective QoS (Quality of Service). In the existing network architecture, extensive development is needed to meet the future demands. The key features of 5G wireless cellular network are versatile, convenient and cloud based services which will establish the innovative and futuristic mobile communicat
发表于 2025-3-22 09:36:18 | 显示全部楼层
发表于 2025-3-22 16:14:41 | 显示全部楼层
Hybrid Encryption Technique for Securing Cloud Data,gers to security of data, the present security standard offers the high level of transparent behavior with respect to users of cloud as well as service providers. The proposed model was implemented by making the use of technologies like Java and the cloud-sim. The cloud-sim and Java were used to imp
发表于 2025-3-22 20:51:06 | 显示全部楼层
发表于 2025-3-23 00:39:00 | 显示全部楼层
发表于 2025-3-23 01:39:29 | 显示全部楼层
A Novel Technique to Secure Telemedicine Using Blockchain and Visual Cryptography,n. The security features provided by blockchain, along with cryptographic primitives, can be used to safeguard the information. Most of the medical data is in an image format. The pixels of the data are arranged along with the patient‘s personal information, and a corresponding hash value is generat
发表于 2025-3-23 08:10:10 | 显示全部楼层
Sensor Node Design Optimization Methods for Enhanced Energy Efficiency in Wireless Sensor Networks,echniques that can be used to improve their performance. These include selection and comparison of low-power components, Dynamic Voltage Scaling, energy harvesting, and optimizing the power supply. By focusing on node design considerations, this paper provides insights into of diverse sensor node de
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-6-27 14:07
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表