skip to main content
Language:
Search Limited to: Search Limited to: Resource type Show Results with: Show Results with: Search type Index

Results 1 - 20 of 32,272  for All Library Resources

Results 1 2 3 4 5 next page
Show only
Result Number Material Type Add to My Shelf Action Record Details and Options
1
Verifying liquidity of recursive Bitcoin contracts
Material Type:
Article
Add to My Research

Verifying liquidity of recursive Bitcoin contracts

Logical methods in computer science, 2022-02, Vol.18, Issue 1 [Peer Reviewed Journal]

ISSN: 1860-5974 ;EISSN: 1860-5974 ;DOI: 10.46298/lmcs-18(1:22)2022

Full text available

2
Categorical composable cryptography: extended version
Material Type:
Article
Add to My Research

Categorical composable cryptography: extended version

Logical methods in computer science, 2023-01, Vol.19, Issue 4 [Peer Reviewed Journal]

ISSN: 1860-5974 ;EISSN: 1860-5974 ;DOI: 10.46298/lmcs-19(4:30)2023

Full text available

3
A theory of transaction parallelism in blockchains
Material Type:
Article
Add to My Research

A theory of transaction parallelism in blockchains

Logical methods in computer science, 2021-01, Vol.17, Issue 4 [Peer Reviewed Journal]

ISSN: 1860-5974 ;EISSN: 1860-5974 ;DOI: 10.46298/lmcs-17(4:10)2021

Full text available

4
Discovering ePassport Vulnerabilities using Bisimilarity
Material Type:
Article
Add to My Research

Discovering ePassport Vulnerabilities using Bisimilarity

Logical methods in computer science, 2021-01, Vol.17, Issue 2 [Peer Reviewed Journal]

EISSN: 1860-5974 ;DOI: 10.23638/LMCS-17(2:24)2021

Full text available

5
Differentially Private Speaker Anonymization
Material Type:
Article
Add to My Research

Differentially Private Speaker Anonymization

arXiv.org, 2023-01 [Peer Reviewed Journal]

2022. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://creativecommons.org/licenses/by/4.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2202.11823

Full text available

6
Selective disclosure of claims from multiple digital credentials
Material Type:
Article
Add to My Research

Selective disclosure of claims from multiple digital credentials

arXiv.org, 2024-05

2024. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://creativecommons.org/licenses/by/4.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2402.15447

Full text available

7
Gr\"obner Basis Cryptanalysis of Ciminion and Hydra
Material Type:
Article
Add to My Research

Gr\"obner Basis Cryptanalysis of Ciminion and Hydra

http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;DOI: 10.48550/arxiv.2405.05040

Digital Resources/Online E-Resources

8
PLLM-CS: Pre-trained Large Language Model (LLM) for Cyber Threat Detection in Satellite Networks
Material Type:
Article
Add to My Research

PLLM-CS: Pre-trained Large Language Model (LLM) for Cyber Threat Detection in Satellite Networks

http://creativecommons.org/licenses/by/4.0 ;DOI: 10.48550/arxiv.2405.05469

Digital Resources/Online E-Resources

9
SmmPack: Obfuscation for SMM Modules with TPM Sealed Key
Material Type:
Article
Add to My Research

SmmPack: Obfuscation for SMM Modules with TPM Sealed Key

http://creativecommons.org/licenses/by/4.0 ;DOI: 10.48550/arxiv.2405.04355

Digital Resources/Online E-Resources

10
A Survey of the Overlooked Dangers of Template Engines
Material Type:
Article
Add to My Research

A Survey of the Overlooked Dangers of Template Engines

http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;DOI: 10.48550/arxiv.2405.01118

Digital Resources/Online E-Resources

11
Measuring the Exploitation of Weaknesses in the Wild
Material Type:
Article
Add to My Research

Measuring the Exploitation of Weaknesses in the Wild

http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;DOI: 10.48550/arxiv.2405.01289

Digital Resources/Online E-Resources

12
IDPFilter: Mitigating Interdependent Privacy Issues in Third-Party Apps
Material Type:
Article
Add to My Research

IDPFilter: Mitigating Interdependent Privacy Issues in Third-Party Apps

http://creativecommons.org/licenses/by-nc-nd/4.0 ;DOI: 10.48550/arxiv.2405.01411

Digital Resources/Online E-Resources

13
Unconditionally Safe Light Client
Material Type:
Article
Add to My Research

Unconditionally Safe Light Client

http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;DOI: 10.48550/arxiv.2405.01459

Digital Resources/Online E-Resources

14
Boosting Communication Efficiency of Federated Learning's Secure Aggregation
Material Type:
Article
Add to My Research

Boosting Communication Efficiency of Federated Learning's Secure Aggregation

http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;DOI: 10.48550/arxiv.2405.01144

Digital Resources/Online E-Resources

15
Development of Cybersecurity Simulator-Based Platform for the Protection of Critical Infrastructures
Material Type:
Article
Add to My Research

Development of Cybersecurity Simulator-Based Platform for the Protection of Critical Infrastructures

http://creativecommons.org/licenses/by-nc-nd/4.0 ;DOI: 10.48550/arxiv.2405.01046

Digital Resources/Online E-Resources

16
Hiding Sensitive Information Using PDF Steganography
Material Type:
Article
Add to My Research

Hiding Sensitive Information Using PDF Steganography

http://creativecommons.org/licenses/by/4.0 ;DOI: 10.48550/arxiv.2405.00865

Digital Resources/Online E-Resources

17
A Blockchain-Based Audit Mechanism for Trust and Integrity in IoT-Fog Environments
Material Type:
Article
Add to My Research

A Blockchain-Based Audit Mechanism for Trust and Integrity in IoT-Fog Environments

http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;DOI: 10.48550/arxiv.2405.00844

Digital Resources/Online E-Resources

18
The Impact of IMSI Catcher Deployments on Cellular Network Security: Challenges and Countermeasures in 4G and 5G Networks
Material Type:
Article
Add to My Research

The Impact of IMSI Catcher Deployments on Cellular Network Security: Challenges and Countermeasures in 4G and 5G Networks

http://creativecommons.org/licenses/by-nc-sa/4.0 ;DOI: 10.48550/arxiv.2405.00793

Digital Resources/Online E-Resources

19
Mitigating Data Sharing in Public Cloud using Blockchain
Material Type:
Article
Add to My Research

Mitigating Data Sharing in Public Cloud using Blockchain

http://creativecommons.org/licenses/by/4.0 ;DOI: 10.48550/arxiv.2404.16872

Digital Resources/Online E-Resources

20
Improving Privacy-Preserving Techniques for Smart Grid using Lattice-based Cryptography
Material Type:
Article
Add to My Research

Improving Privacy-Preserving Techniques for Smart Grid using Lattice-based Cryptography

http://creativecommons.org/licenses/by/4.0 ;DOI: 10.48550/arxiv.2404.16865

Digital Resources/Online E-Resources

Results 1 - 20 of 32,272  for All Library Resources

Results 1 2 3 4 5 next page

Personalize your results

  1. Edit

Refine Search Results

Expand My Results

  1.   

Show only

  1. Peer-reviewed Journals (20)

Refine My Results

Creation Date 

From To
  1. Before 2001  (35)
  2. 2001 To 2005  (269)
  3. 2006 To 2010  (1,202)
  4. 2011 To 2016  (4,260)
  5. After 2016  (26,507)
  6. More options open sub menu

Searching Remote Databases, Please Wait