Treffer 1 - 20
von 121
- 1
- 2
Seite in der Trefferliste auswählen
Secure Volunteer Computing for Distributed Cryptanalysis
Kopal, Nils ; Kassel, Universität Kassel, Fachbereich Elektrotechnik / Informatik ; Wacker, Arno (Prof. Dr.) ; et al.
A Secure Ticket-Based Authentication Mechanism for Proxy Mobile IPv6 Networks in Volunteer Computing.
ALIZADEH, MOJTABA ; TADAYON, MOHAMMAD HESAM ; KOUICHI SAKURAI ; et al.
ACM Transactions on Internet Technology; Oct2021, Vol. 21 Issue 4, p1-16, 16p
Simulating Cheated Results Dissemination for Volunteer Computing.
Kopal, Nils ; Kieselmann, Olga ; Wacker, Arno
2012 International Waveform Diversity & Design Conference (WDD); 2012, p742-747, 6p
Partitioning-Based Data Sharing Approach for Data Integrity Verification in Distributed Fog Computing.
Kaliyaperuma, Uma Maheswari ; Somasundaram, Mary Saira Bhanu ; Savarimuthu, Nickolas
International Journal of Engineering & Technology Innovation; Apr2023, Vol. 13 Issue 2, p160-174, 15p
Distributed Ledger-Based Authentication and Authorization of IoT Devices in Federated Environments.
Jarosz, Michał ; Wrona, Konrad ; Zieliński, Zbigniew
Electronics (2079-9292); Oct2024, Vol. 13 Issue 19, p3932, 36p
Manna SafeioD: A Framework and Roadmap for Secure Design in the Internet of Drones.
Marques, Luiz H. C. M. ; Ruiz, Linnyer B.
Applied Sciences (2076-3417); Jan2026, Vol. 16 Issue 1, p505, 55p
Parallelization of Rainbow Tables Generation Using Message Passing Interface: A Study on NTLMv2, MD5, SHA-256 and SHA-512 Cryptographic Hash Functions.
Vainer, Mark ; Kačeniauskas, Arnas ; Goranin, Nikolaj
Applied Sciences (2076-3417); Aug2025, Vol. 15 Issue 15, p8152, 20p
Mobile crowd computing: potential, architecture, requirements, challenges, and applications.
Pramanik, Pijush Kanti Dutta ; Pal, Saurabh ; Choudhury, Prasenjit
Journal of Supercomputing; Jan2024, Vol. 80 Issue 2, p2223-2318, 96p
A QUANTUM OF PRIVACY.
Lior, Anat
Nevada Law Journal; Fall2024, Vol. 25 Issue 1, p1-58, 58p
Press play, install malware: a study of rhythm game-based malware dropping.
Vasilellis, Efstratios ; Gkionis, Grigoris ; Gritzalis, Dimitris
International Journal of Information Security. Oct2024, Vol. 23 Issue 5, p3369-3391. 23p.
Privacy preserving framework using Gaussian mutation based firebug optimization in cloud computing.
Anand, K. ; Vijayaraj, A. ; Vijay Anand, M.
Journal of Supercomputing; May2022, Vol. 78 Issue 7, p9414-9437, 24p
Efficient face information encryption and verification scheme based on full homomorphic encryption.
Chen, Yijia ; Duan, Fei ; Zhao, Yuhui ; et al.
Scientific Reports; 4/3/2025, Vol. 15 Issue 1, p1-15, 15p
Biometric Cryptosystem to Secure Smart Object Communications in the Internet of Things.
Meraoumia, Abdallah ; Amroune, Mohammed ; Laimeche, Lakhdar ; et al.
Kuwait Journal of Science; 2022, Vol. 49 Issue 2, p1-28, 28p
A Quantum Algorithm for the Classification of Patterns of Boolean Functions.
Andronikos, Theodore ; Bitsakos, Constantinos ; Nikas, Konstantinos ; et al.
Mathematics (2227-7390); Jun2025, Vol. 13 Issue 11, p1750, 23p
Toward the Internet of Medical Things: Architecture, trends and challenges.
Qinwang Niu ; Haoyue Li ; Yu Liu ; et al.
Mathematical Biosciences & Engineering; 2024, Vol. 21 Issue 1, p650-678, 29p
Design Space Exploration for Ultra-Low-Energy and Secure IoT MCUs.
AERABI, EHSAN ; BOHLOULI, MILAD ; LIVANY, MOHAMMAD HASAN AHMADI ; et al.
ACM Transactions on Embedded Computing Systems; Jun2020, Vol. 19 Issue 3, p1-34, 34p
Mobile Architecture for Distributed Brute-Force Attacks.
MARCULESCU, Alexandru
Journal of Mobile, Embedded & Distributed Systems; 2014, Vol. 6 Issue 1, p30-37, 8p
Privacy-preserving association rule mining based on electronic medical system.
Xu, Wenju ; Zhao, Qingqing ; Zhan, Yu ; et al.
Wireless Networks (10220038); Jan2022, Vol. 28 Issue 1, p303-317, 15p
Overlapping Coalition Formation Game via Multi-Objective Optimization for Crowdsensing Task Allocation.
Fu, Yanming ; Liu, Xiao ; Han, Weigeng ; et al.
Electronics (2079-9292); Aug2023, Vol. 12 Issue 16, p3454, 18p
An image partition security-sharing mechanism based on blockchain and chaotic encryption.
Wang, Na ; Wang, Xiaochang ; Liu, Aodi ; et al.
PLoS ONE; 7/29/2024, Vol. 19 Issue 7, p1-38, 38p
- 1
- 2