Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Article
|
Verifying liquidity of recursive Bitcoin contractsLogical methods in computer science, 2022-02, Vol.18, Issue 1 [Peer Reviewed Journal]ISSN: 1860-5974 ;EISSN: 1860-5974 ;DOI: 10.46298/lmcs-18(1:22)2022Full text available |
|
2 |
Material Type: Article
|
Categorical composable cryptography: extended versionLogical methods in computer science, 2023-01, Vol.19, Issue 4 [Peer Reviewed Journal]ISSN: 1860-5974 ;EISSN: 1860-5974 ;DOI: 10.46298/lmcs-19(4:30)2023Full text available |
|
3 |
Material Type: Article
|
A theory of transaction parallelism in blockchainsLogical methods in computer science, 2021-01, Vol.17, Issue 4 [Peer Reviewed Journal]ISSN: 1860-5974 ;EISSN: 1860-5974 ;DOI: 10.46298/lmcs-17(4:10)2021Full text available |
|
4 |
Material Type: Article
|
Discovering ePassport Vulnerabilities using BisimilarityLogical methods in computer science, 2021-01, Vol.17, Issue 2 [Peer Reviewed Journal]EISSN: 1860-5974 ;DOI: 10.23638/LMCS-17(2:24)2021Full text available |
|
5 |
Material Type: Article
|
Differentially Private Speaker AnonymizationarXiv.org, 2023-01 [Peer Reviewed Journal]2022. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://creativecommons.org/licenses/by/4.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2202.11823Full text available |
|
6 |
Material Type: Article
|
Selective disclosure of claims from multiple digital credentialsarXiv.org, 2024-052024. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://creativecommons.org/licenses/by/4.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2402.15447Full text available |
|
7 |
Material Type: Article
|
Gr\"obner Basis Cryptanalysis of Ciminion and Hydrahttp://arxiv.org/licenses/nonexclusive-distrib/1.0 ;DOI: 10.48550/arxiv.2405.05040Digital Resources/Online E-Resources |
|
8 |
Material Type: Article
|
PLLM-CS: Pre-trained Large Language Model (LLM) for Cyber Threat Detection in Satellite Networkshttp://creativecommons.org/licenses/by/4.0 ;DOI: 10.48550/arxiv.2405.05469Digital Resources/Online E-Resources |
|
9 |
Material Type: Article
|
SmmPack: Obfuscation for SMM Modules with TPM Sealed Keyhttp://creativecommons.org/licenses/by/4.0 ;DOI: 10.48550/arxiv.2405.04355Digital Resources/Online E-Resources |
|
10 |
Material Type: Article
|
A Survey of the Overlooked Dangers of Template Engineshttp://arxiv.org/licenses/nonexclusive-distrib/1.0 ;DOI: 10.48550/arxiv.2405.01118Digital Resources/Online E-Resources |
|
11 |
Material Type: Article
|
Measuring the Exploitation of Weaknesses in the Wildhttp://arxiv.org/licenses/nonexclusive-distrib/1.0 ;DOI: 10.48550/arxiv.2405.01289Digital Resources/Online E-Resources |
|
12 |
Material Type: Article
|
IDPFilter: Mitigating Interdependent Privacy Issues in Third-Party Appshttp://creativecommons.org/licenses/by-nc-nd/4.0 ;DOI: 10.48550/arxiv.2405.01411Digital Resources/Online E-Resources |
|
13 |
Material Type: Article
|
Unconditionally Safe Light Clienthttp://arxiv.org/licenses/nonexclusive-distrib/1.0 ;DOI: 10.48550/arxiv.2405.01459Digital Resources/Online E-Resources |
|
14 |
Material Type: Article
|
Boosting Communication Efficiency of Federated Learning's Secure Aggregationhttp://arxiv.org/licenses/nonexclusive-distrib/1.0 ;DOI: 10.48550/arxiv.2405.01144Digital Resources/Online E-Resources |
|
15 |
Material Type: Article
|
Development of Cybersecurity Simulator-Based Platform for the Protection of Critical Infrastructureshttp://creativecommons.org/licenses/by-nc-nd/4.0 ;DOI: 10.48550/arxiv.2405.01046Digital Resources/Online E-Resources |
|
16 |
Material Type: Article
|
Hiding Sensitive Information Using PDF Steganographyhttp://creativecommons.org/licenses/by/4.0 ;DOI: 10.48550/arxiv.2405.00865Digital Resources/Online E-Resources |
|
17 |
Material Type: Article
|
A Blockchain-Based Audit Mechanism for Trust and Integrity in IoT-Fog Environmentshttp://arxiv.org/licenses/nonexclusive-distrib/1.0 ;DOI: 10.48550/arxiv.2405.00844Digital Resources/Online E-Resources |
|
18 |
Material Type: Article
|
The Impact of IMSI Catcher Deployments on Cellular Network Security: Challenges and Countermeasures in 4G and 5G Networkshttp://creativecommons.org/licenses/by-nc-sa/4.0 ;DOI: 10.48550/arxiv.2405.00793Digital Resources/Online E-Resources |
|
19 |
Material Type: Article
|
Mitigating Data Sharing in Public Cloud using Blockchainhttp://creativecommons.org/licenses/by/4.0 ;DOI: 10.48550/arxiv.2404.16872Digital Resources/Online E-Resources |
|
20 |
Material Type: Article
|
Improving Privacy-Preserving Techniques for Smart Grid using Lattice-based Cryptographyhttp://creativecommons.org/licenses/by/4.0 ;DOI: 10.48550/arxiv.2404.16865Digital Resources/Online E-Resources |