We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. Lattice-Based Polynomial Commitments: Towards Asymptotic and Concrete Efficiency

    Polynomial commitments schemes are a powerful tool that enables one party to commit to a polynomial p of degree d , and prove that the committed...

    Giacomo Fenzi, Hossein Moghaddas, Ngoc Khanh Nguyen in Journal of Cryptology
    Article Open access 10 July 2024
  2. The Price of Active Security in Cryptographic Protocols

    We construct the first actively-secure Multi-Party Computation (MPC) protocols with an arbitrary number of parties in the dishonest majority setting,...

    Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Mor Weiss in Journal of Cryptology
    Article Open access 10 July 2024
  3. Extract Implicit Semantic Friends and Their Influences from Bipartite Network for Social Recommendation

    Social recommendation often incorporates trusted social links with user-item interactions to enhance rating prediction. Although methods that...

    Zhigao Zhang, Fanfei Song, ... Chuansheng Dong in Data Science and Engineering
    Article Open access 09 July 2024
  4. Adaptive context-aware access control for IoT environments leveraging fog computing

    The increasing use of the Internet of Things (IoT) has driven the demand for enhanced and robust access control methods to protect resources from...

    Rudri Kalaria, A. S. M. Kayes, ... Ahmad Salehi Shahraki in International Journal of Information Security
    Article Open access 08 July 2024
  5. Using the ACE framework to enforce access and usage control with notifications of revoked access rights

    The standard ACE framework provides authentication and authorization mechanisms similar to those of the standard OAuth 2.0 framework, but it is...

    Marco Rasori, Andrea Saracino, ... Marco Tiloca in International Journal of Information Security
    Article Open access 08 July 2024
  6. Algebraic lattices coming from \({\mathbb {Z}}\)-modules generalizing ramified prime ideals in odd prime degree cyclic number fields

    Lattice theory has shown to be useful in information theory, and rotated lattices with high modulation diversity have been extensively studied as an...

    Antonio Aparecido de Andrade, Robson Ricardo de Araujo, ... Jefferson Luiz Rocha Bastos in Applicable Algebra in Engineering, Communication and Computing
    Article 08 July 2024
  7. Automating shareable cyber threat intelligence production for closed source software vulnerabilities: a deep learning based detection system

    Software can be vulnerable to various types of interference. The production of cyber threat intelligence for closed source software requires...

    Süleyman Muhammed Arıkan, Aynur Koçak, Mustafa Alkan in International Journal of Information Security
    Article Open access 08 July 2024
  8. Around LCD group codes

    Javier de la Cruz, Wolfgang Willems in Designs, Codes and Cryptography
    Article 05 July 2024
  9. Trust management in the internet of vehicles: a systematic literature review of blockchain integration

    The Internet of Vehicles (IoV) promises to revolutionize transportation in smart cities, but its interconnectedness raises critical security and...

    Shirin Abbasi, Navid Khaledian, Amir Masoud Rahmani in International Journal of Information Security
    Article 05 July 2024
  10. Vectorial negabent concepts: similarities, differences, and generalizations

    In Pasalic et al. (IEEE Trans Inf Theory 69:2702–2712, 2023), and in Anbar and Meidl (Cryptogr Commun 10:235–249, 2018), two different vectorial...

    Nurdagül Anbar, Sadmir Kudin, ... Alexandr Polujan in Designs, Codes and Cryptography
    Article Open access 05 July 2024
  11. Expediting the design and development of secure cloud-based mobile apps

    The adoption and popularity of mobile devices by end-users is partially driven by the increasing development and availability of mobile applications...

    Francisco T. Chimuco, Joāo B. F. Sequeiros, ... Pedro R. M. Inácio in International Journal of Information Security
    Article Open access 04 July 2024
  12. Some self-dual codes and isodual codes constructed by matrix product codes

    In 2020, Cao et al. proved that any repeated-root constacyclic code is monomially equivalent to a matrix product code of simple-root constacyclic...

    Xu Pan, Hao Chen, Hongwei Liu in Designs, Codes and Cryptography
    Article 04 July 2024
  13. The NP-hard problem of computing the maximal sample variance over interval data is solvable in almost linear time with a high probability

    We consider the algorithm by Ferson et al. (Reliab Comput 11(3):207--233, 2005) designed for solving the NP-hard problem of computing the maximal...

    M. Rada, M. Černý, O. Sokol in computational complexity
    Article 03 July 2024
  14. Stable coherent systems

    We describe the notion of stability of coherent systems as a framework to deal with redundancy. We define stable coherent systems and show how this...

    Rodrigo Iglesias, Fatemeh Mohammadi, ... Henry P. Wynn in Applicable Algebra in Engineering, Communication and Computing
    Article 02 July 2024
  15. Stagnation Detection in Highly Multimodal Fitness Landscapes

    Stagnation detection has been proposed as a mechanism for randomized search heuristics to escape from local optima by automatically increasing the...

    Amirhossein Rajabi, Carsten Witt in Algorithmica
    Article Open access 02 July 2024
  16. Some constacyclic BCH codes with good parameters

    BCH codes as a subclass of constacyclic BCH codes have been widely studied, while the results on the parameters of BCH codes over finite fields are...

    ** Li, Huilian Zhu, Shan Huang in Designs, Codes and Cryptography
    Article 02 July 2024
Did you find what you were looking for? Share feedback.