We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. Low-Modeling of Software Systems

    There is a growing need for better development methods and tools to keep up with the increasing complexity of new software systems. New types of user...
    Jordi Cabot in Software Technologies
    Conference paper 2024
  2. Performance Evaluation of LoRa in a Linear Deployment Scenario

    The Internet of Things (IoT) has become an essential daily field. This is mainly because of the advances in digital technologies, miniaturization,...
    Ass Diane, El Hadji Malick Ndoye, Ousmane Diallo in Ubiquitous Networking
    Conference paper 2024
  3. Data Balancing Process to Strengthen a Malaria Control Prediction System in Senegal

    Malaria is a public health problem in Senegal. Despite the implementation of prevention and treatment programs, the prevalence rate remains high,...
    Kodzo Parkoo, Bamba Gueye, ... Ibrahima Dia in Ubiquitous Networking
    Conference paper 2024
  4. Convergence of Blockchain Enabled Internet of Things (IoT) Framework: A Survey

    Recent research and experiments in the field of Internet of Things (IoT) security have found that these devices are vulnerable to various attacks,...
    Vatsala Upadhyay, Abhishek Vaish, J. Kokila in Ubiquitous Networking
    Conference paper 2024
  5. Evaluating the Adoption of Enterprise Architecture in Universiti Teknologi MARA, Malaysia

    In today’s dynamic landscape, organisations face unprecedented challenges stemming from societal, business, and technological shifts. Amidst this...
    Noor Syazwani Binti Muhammad Yani, Surya Sumarni Binti Hussein, ... Anitawati Lokman in Knowledge Management in Organisations
    Conference paper 2024
  6. Building a Sustainable Knowledge Management System from Dark Data in Industrial Maintenance

    As digitalization exponentially generates vast data volumes, concerns about its environmental impact have surged. Dark data, characterized by being...
    Keyi Zhong, Tom Jackson, ... Georgina Cosma in Knowledge Management in Organisations
    Conference paper 2024
  7. Data-Driven Student Recruitment Strategies in Private Higher Educational Institutions

    This research advocates for the integration of data analytics as a pivotal strategy for private higher education institutions (HEI) to navigate the...
    Kallychurn Dooshyant Rai, Vinothini Kasinathan, Aida Mustapha in Knowledge Management in Organisations
    Conference paper 2024
  8. Artificial Intelligence to Elevate Knowledge Management in Malaysian Public Sector: An Overview

    Studies show that the capabilities of Artificial Intelligence (AI) significantly elevate Knowledge Management (KM), allowing employees to swiftly...
    Rohaizan Daud, Norasyikin Shaikh Ibrahim, Min Hui Leow in Knowledge Management in Organisations
    Conference paper 2024
  9. Knowledge Management and Web 3.0

    It is commonly believed that information technologies (IT) play essential role in implementing knowledge management in organizations (Franco and...
    Conference paper 2024
  10. Optimally-Fair Multi-party Exchange Without Trusted Parties

    We present a multi-party exchange protocol that achieves optimal partial fairness even in the presence of a dishonest majority. We demonstrate how...
    Ivo Maffei, A. W. Roscoe in Computer Security – ESORICS 2023
    Conference paper Open access 2024
  11. Fully Tally-Hiding Verifiable E-Voting for Real-World Elections with Seat-Allocations

    Modern e-voting systems provide what is called verifiability, i.e., voters are able to check that their votes have actually been counted despite...
    Carmen Wabartha, Julian Liedtke, ... Ralf Küsters in Computer Security – ESORICS 2023
    Conference paper 2024
  12. Arithmetic Circuit Implementations of S-boxes for SKINNY and PHOTON in MPC

    Secure multi-party computation (MPC) enables multiple distrusting parties to compute a function while kee** their respective inputs private. In a...
    Aysajan Abidin, Erik Pohle, Bart Preneel in Computer Security – ESORICS 2023
    Conference paper 2024
  13. Scaling Mobile Private Contact Discovery to Billions of Users

    Mobile contact discovery is a convenience feature of messengers such as WhatsApp or Telegram that helps users to identify which of their existing...
    Laura Hetz, Thomas Schneider, Christian Weinert in Computer Security – ESORICS 2023
    Conference paper 2024
  14. Code-Based Secret Handshake Scheme, Revisited

    Secret handshake (SH) allows two users to authenticate each other anonymously only when they are in the same group. Recently, due to the concern of...
    Minkyu Kim, Hyung Tae Lee in Computer Security – ESORICS 2023
    Conference paper 2024
  15. Cheap and Fast Iterative Matrix Inverse in Encrypted Domain

    Homomorphic encryption (HE) is a promising technique for preserving the privacy of sensitive data by enabling computations to be performed on...
    Tae Min Ahn, Kang Hoon Lee, ... Ji Won Yoon in Computer Security – ESORICS 2023
    Conference paper 2024
  16. Deniable Cryptosystems: Simpler Constructions and Achieving Leakage Resilience

    Deniable encryption (Canetti et al. in CRYPTO ’97) is an intriguing primitive, which provides security guarantee against coercion by allowing a...
    Zhiyuan An, Haibo Tian, ... Fangguo Zhang in Computer Security – ESORICS 2023
    Conference paper 2024
  17. Covercrypt: An Efficient Early-Abort KEM for Hidden Access Policies with Traceability from the DDH and LWE

    Attribute-Based Encryption (ABE) is a very attractive primitive to limit access according to specific rights. While very powerful instantiations have...
    Théophile Brézot, Paola de Perthuis, David Pointcheval in Computer Security – ESORICS 2023
    Conference paper 2024
  18. Sugarcane Bud Detection Using YOLOv5

    This paper addresses the labor-intensive and wasteful nature of the traditional sugarcane bud cutting method. To overcome these challenges, the...
    P. Swathi Sindhe, Ravindra S. Hegadi in Recent Trends in Image Processing and Pattern Recognition
    Conference paper 2024
  19. Framework for Upscaling Missing Data in Electricity Consumption Datasets Using Generative Adversarial Networks

    One of the leading issues in adopting electricity load prediction today is the lack of high-quality and high-resolution real-world datasets. This...
    Diana Romero, R. Alcaraz-Fraga, Ponciano J. Escamilla-Ambrosio in Smart Cities
    Conference paper 2024
  20. Intelligent Urban Cycling Assistance Based on Simplified Machine Learning

    Urban cycling is a sustainable mode of transportation in large cities, and it offers many advantages. It is an eco-friendly means of transport that...
    Alejandro Hernández-Herrera, Elsa Rubio-Espino, ... Victor H. Ponce-Ponce in Smart Cities
    Conference paper 2024
Did you find what you were looking for? Share feedback.