找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Emerging Information Security and Applications; Third International Jiageng Chen,Debiao He,Rongxing Lu Conference proceedings 2022 The Edi

[复制链接]
楼主: 警察在苦笑
发表于 2025-3-23 09:58:31 | 显示全部楼层
https://doi.org/10.1007/978-3-658-42814-3ning coordinates participants collaboratively train a powerful global model. However, this process has several problems: it cannot meet the heterogeneous model’s requirements, and it cannot resist poisoning attacks and single-point-of-failure. In order to resolve these issues, we proposed a heteroge
发表于 2025-3-23 15:28:32 | 显示全部楼层
Werkstattberichte aus der Praxis,ptosystem. Aiming at the security problem of an authentication key agreement protocol using certificateless aggregate signature in VANET, an improved certificateless authentication key agreement protocol based on elliptic curve is proposed, and then the security of the protocol is analyzed. The anal
发表于 2025-3-23 21:12:53 | 显示全部楼层
,Der Konzeptions- und Einführungsprozess,) and the compensatory reconstruction attack (CRA) can reconstruct the training data according to the gradients uploaded by users. We propose an efficient federated convolutional neural network scheme with differential privacy to solve this problem. By adding Gaussian noise to the fully connected la
发表于 2025-3-23 23:06:26 | 显示全部楼层
Nachhaltigkeit als didaktische Kategorie, in different trust domains connect through blockchain technology. However, a single IDP in the domain is still at the risk of being compromised or corrupted. What’s more, users may create redundant identities for different services but can not dominate all their identities completely. Therefore, we
发表于 2025-3-24 06:21:18 | 显示全部楼层
https://doi.org/10.1007/978-3-662-57693-9average temperature and the maximum humidity of an area. The existing privacy-preserving aggregation query algorithms depend on pre-established network topology, and maintaining network topology requires lots of energy. In addition, these algorithms assume that the nodes between the communication ra
发表于 2025-3-24 08:53:21 | 显示全部楼层
发表于 2025-3-24 11:44:08 | 显示全部楼层
978-3-031-23097-4The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerl
发表于 2025-3-24 15:37:03 | 显示全部楼层
发表于 2025-3-24 21:04:19 | 显示全部楼层
,Asymmetric Secure Multi-party Signing Protocol for the Identity-Based Signature Scheme in the IEEE e are various kinds of devices corresponding to diversified security requirements, it could be a worthwhile trade-off to preserve the secret key by signing in a multi-party setting. However, most multi-party setting solutions start with resetting their one-time secret subkey, which could be a potent
发表于 2025-3-25 01:47:12 | 显示全部楼层
,A Multi-task Mobile Crowdsensing Scheme with Conditional Privacy Preserving for Vehicle Networks,sensing paradigm with low deploying costs. As the development of vehicle networks, many works in the literature have investigated how to use vehicles as the sensing units for mobile crowdsensing. However, the majority of these works suffer some limitations. First, they can either achieve privacy pre
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-6-8 17:44
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表