Coin-based Secure Computations (English)
Free access
- New search for: Komano, Yuichi
- Further information on Komano, Yuichi:
- https://orcid.org/0000-0002-5121-3458
- New search for: Mizuki, Takaaki
- Further information on Mizuki, Takaaki:
- https://orcid.org/0000-0002-8698-1043
- New search for: Komano, Yuichi
- Further information on Komano, Yuichi:
- https://orcid.org/0000-0002-5121-3458
- New search for: Mizuki, Takaaki
- Further information on Mizuki, Takaaki:
- https://orcid.org/0000-0002-8698-1043
In:
International Journal of Information Security
;
21
, 4
; 833-846
;
2022
-
ISSN:
- Article (Journal) / Electronic Resource
-
Title:Coin-based Secure Computations
-
Contributors:Komano, Yuichi ( author ) / Mizuki, Takaaki ( author )
-
Published in:International Journal of Information Security ; 21, 4 ; 833-846
-
Publisher:
- New search for: Springer Berlin Heidelberg
- New search for: Springer
-
Place of publication:Heidelberg
-
Publication date:2022
-
ISSN:
-
ZDBID:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Electronic Resource
-
Language:English
- New search for: 54.38$jComputersicherheit / 54.38
- Further information on Basic classification
-
Keywords:
-
Classification:
BKL: 54.38$jComputersicherheit / 54.38 Computersicherheit -
Source:
Table of contents – Volume 21, Issue 4
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
IoT-oriented high-efficient anti-malware hardware focusing on time series metadata extractable from inside a processor coreKoike, Kazuki / Kobayashi, Ryotaro / Katoh, Masahiko et al. | 2022
- 707
-
Scalable, password-based and threshold authentication for smart homesHuszti, Andrea / Kovács, Szabolcs / Oláh, Norbert et al. | 2022
- 725
-
MAPAS: a practical deep learning-based android malware detection systemKim, Jinsung / Ban, Younghoon / Ko, Eunbyeol / Cho, Haehyun / Yi, Jeong Hyun et al. | 2022
- 739
-
A first look at references from the dark to the surface web world: a case study in TorZabihimayvan, Mahdieh / Doran, Derek et al. | 2022
- 777
-
Developing non-interactive MPC with trusted hardware for enhanced securityKarl, Ryan / Burchfield, Hannah / Takeshita, Jonathan / Jung, Taeho et al. | 2022
- 799
-
ThunderSecure: deploying real-time intrusion detection for 100G research networks by leveraging stream-based features and one-class classification networkGong, Qian / DeMar, Phil / Altunay, Mine et al. | 2022
- 813
-
A multi-objective cost–benefit optimization algorithm for network hardeningZenitani, Kengo et al. | 2022
- 833
-
Coin-based Secure ComputationsKomano, Yuichi / Mizuki, Takaaki et al. | 2022
- 847
-
A systematic literature review on wearable health data publishing under differential privacySaifuzzaman, Munshi / Ananna, Tajkia Nuri / Chowdhury, Mohammad Jabed Morshed / Ferdous, Md Sadek / Chowdhury, Farida et al. | 2022
- 873
-
A survey on analyzing encrypted network traffic of mobile devicesAgrawal, Ankit / Bhatia, Ashutosh / Bahuguna, Ayush / Tiwari, Kamlesh / Haribabu, K. / Vishwakarma, Deepak / Kaushik, Rekha et al. | 2022
- 917
-
Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domainsZia, Unsub / McCartney, Mark / Scotney, Bryan / Martinez, Jorge / AbuTair, Mamun / Memon, Jamshed / Sajjad, Ali et al. | 2022
- 937
-
Challenges of post-quantum digital signing in real-world applications: a surveyTan, Teik Guan / Szalachowski, Pawel / Zhou, Jianying et al. | 2022