We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 21-40 of 10,000 results
  1. One Time Chat – A Toy End-to-End Encrypted Web Messaging Service

    In the digital age, instant messaging (IM) is a cornerstone of communication, necessitating secure and efficient platforms. The One Time Chat web...
    Kamil Kaczyński, Michał Glet in Applied Cryptography and Network Security Workshops
    Conference paper 2024
  2. Everything All at Once: Deep Learning Side-Channel Analysis Optimization Framework

    Deep learning is becoming an increasingly proficient tool for side-channel analysis. While deep learning has been evolving around the tasks of image...
    Gabriele Serafini, Léo Weissbart, Lejla Batina in Applied Cryptography and Network Security Workshops
    Conference paper 2024
  3. Physically Unclonable Fingerprints for Authentication

    We have developed an innovative fingerprinting method using the melt-electrospinning printing process for product authentication. This method...
    Navajit S. Baban, Jiarui Zhou, ... Ramesh Karri in Applied Cryptography and Network Security Workshops
    Conference paper 2024
  4. Cross-Correlation Based Trace Segmentation for Clustering Power Analysis on Public Key Cryptosystems

    Simple Power Analysis (SPA) is a technique that directly analyzes the power consumption information collected during the execution of cryptographic...
    Yaoyuan Hu, An Wang, ... Shufan Ma in Applied Cryptography and Network Security Workshops
    Conference paper 2024
  5. Privacy-Preserving Sentiment Analysis Using Homomorphic Encryption and Attention Mechanisms

    Homomorphic encryption (HE) is a promising approach to preserving the privacy of data used in machine learning by allowing computations to be...
    Amirhossein Ebrahimi Moghaddam, Buvana Ganesh, Paolo Palmieri in Applied Cryptography and Network Security Workshops
    Conference paper 2024
  6. Quantum Circuit Design for the Lee-Brickell Based Information Set Decoding

    In the race for quantum-safe cryptography, fostered by the ongoing National Institute of Standards and Technology (NIST) post-quantum standardization...
    Simone Perriello, Alessandro Barenghi, Gerardo Pelosi in Applied Cryptography and Network Security Workshops
    Conference paper 2024
  7. Diversity Algorithms for Laser Fault Injection

    Before third-party evaluation and certification, manufacturers often conduct internal security evaluations on secure hardware devices, including...
    Conference paper 2024
  8. One Class to Test Them All: One-Class Classifier-Based ADS-B Location Spoofing Detection

    Automatic Dependent Surveillance-Broadcast (ADS-B) is an integral part of the Next Generation Air Transport System, providing an efficient and safe...
    Alessandro Brighente, Mauro Conti, ... Federico Turrin in Applied Cryptography and Network Security Workshops
    Conference paper 2024
  9. Power Quality Forecasting of Microgrids Using Adaptive Privacy-Preserving Machine Learning

    Microgrids face challenges in monitoring and controlling the power quality (PQ) of integrated electrical systems to make timely decisions....
    Mazhar Ali, Ajit Kumar, Bong Jun Choi in Applied Cryptography and Network Security Workshops
    Conference paper 2024
  10. EasyLog: An Efficient Kernel Logging Service for Machine Learning

    Recently, logs serves as a crucial tool to monitor system’s real-time state for experiments and generate data for machine learning. However, the...
    Xundi Yang, Kefan Qiu, Quanxin Zhang in Applied Cryptography and Network Security Workshops
    Conference paper 2024
  11. Measuring Cyber Resilience of IoT-Enabled Critical National Infrastructures

    Critical National Infrastructure (CNI) is vital and critical to the delivery of essential services to society and is necessary for a country to...
    Adeola Adewumi, Mohammad Hammoudeh, ... Olamide Jogunola in Applied Cryptography and Network Security Workshops
    Conference paper 2024
  12. Enhancing Cognitive Rehabilitation with Augmented Reality: The Role of Virtual Characters in Attention Restoration

    This study investigates the efficacy of Augmented Reality (AR) in enhancing attention restoration, leveraging the conceptual framework of Attention...
    Hanfu He, Wei Cui, Yu Wang in Virtual, Augmented and Mixed Reality
    Conference paper 2024
  13. A Virtual Reality Based Therapeutic Approach for Stuttering Intervention

    Stuttering, a speech disorder with far-reaching effects on communication and emotional well-being, has long posed challenges for those affected. This...
    J. Cecil, John A. Tetnowski, Sriram Kumar Tentu in Virtual, Augmented and Mixed Reality
    Conference paper 2024
  14. Z3VR - An Interactive VR Learning Environment for One of the First Computers (Konrad Zuse’s Z3)

    This paper presents Z3VR, an interactive simulation of Konrad Zuse’s Z3 computer in a Virtual Reality (VR) environment, intended to give users the...
    Lukas Moersler, David A. Plecher, ... Gudrun Klinker in Virtual, Augmented and Mixed Reality
    Conference paper 2024
  15. Mixed-Integer Programming for Adaptive VR Workflow Training

    With advances in consumer-grade virtual reality (VR) devices, VR training gains unprecedented attention in research and industries. Although the...
    Yongqi Zhang, Chuan Yan, ... Lap-Fai Yu in Virtual, Augmented and Mixed Reality
    Conference paper 2024
  16. Improving UX in Digital Transformation Projects Through Lean Principles

    Today, digital transformation remains a key strategic objective for most companies. Through these processes, they seek to stay ahead in a constantly...
    Héctor Cornide-Reyes, Cristian Duran, ... Jenny Morales in Social Computing and Social Media
    Conference paper 2024
  17. Improving the Learning Experience in Ethics Education with Groupware: A Case Study

    Incorporating ethics into engineering education is crucial to address the intricate challenges of societal technologization, artificial intelligence,...
    Claudio Álvarez, Gustavo Zurita, Luis A. Rojas in Social Computing and Social Media
    Conference paper 2024
  18. Use of Artificial Intelligence as a Mechanism to Evaluate Costumer Experience. Literature Review

    In the contemporary era marked by the explosion of data, the widespread adoption of Artificial Intelligence (AI) technologies has become essential...
    Fabián Silva-Aravena, Jenny Morales, ... Héctor Cornide-Reyes in Social Computing and Social Media
    Conference paper 2024
  19. Location Information Sharing System on a Virtual Town Map to Enhance a Sense of Connectedness with Group Members

    Social isolation and loneliness among people living alone are major social issues that can lead to anxiety and depression. One possible approach to...
    Yui Toshimitsu, Masayuki Ando, ... Tomoko Izumi in Social Computing and Social Media
    Conference paper 2024
  20. Exploration of Cultural IP Image and Common Pattern Gene Extraction in Virtual Reality Design Interaction

    This paper first studies the origin and flow of IP images from the interactive perspective of design, explores the definition and rules of IP in the...
    Junyu Zhou, Ruiyang Chen in Virtual, Augmented and Mixed Reality
    Conference paper 2024
Did you find what you were looking for? Share feedback.