default search action
17th QSHINE 2021: Virtual Event
- Xingliang Yuan, Wei Bao, Xun Yi, Nguyen Hoang Tran:
Quality, Reliability, Security and Robustness in Heterogeneous Systems - 17th EAI International Conference, QShine 2021, Virtual Event, November 29-30, 2021, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 402, Springer 2021, ISBN 978-3-030-91423-3
Machine Learning in Distributed Networks
- Chandra Thapa, Kallol Krishna Karmakar, Alberto Huertas Celdrán, Seyit Camtepe, Vijay Varadharajan, Surya Nepal:
FedDICE: A Ransomware Spread Detection in a Distributed Integrated Clinical Environment Using Federated Learning and SDN Based Mitigation. 3-24 - Chengyao Xu, Shangqi Lai:
Accelerating TEE-Based DNN Inference Using Mean Shift Network Pruning. 25-41 - Rui Lian, Anxin Zhou, Yifeng Zheng, Cong Wang:
Towards Secure and Trustworthy Crowdsourcing with Versatile Data Analytics. 42-53
Blockchain Networks and Blockchain-Based Applications
- Ziaur Rahman, Xun Yi, Ibrahim Khalil, Andrei Kelarev:
Blockchain for IoT: A Critical Analysis Concerning Performance and Scalability. 57-74 - Mitsuyoshi Imamura, Kazumasa Omote:
Toward Achieving Unanimity for Implicit Closings in a Trustless System. 75-93 - Xianxian Li, Junhao Yang, Shiqi Gao, Zhenkui Shi, Jie Li, Xuemei Fu:
DBS: Blockchain-Based Privacy-Preserving RBAC in IoT. 94-110 - Xianxian Li, Jiahui Peng, Zhenkui Shi, Chunpei Li:
Achieving Fair and Accountable Data Trading Scheme for Educational Multimedia Data Based on Blockchain. 111-125
5G Networks and Security
- Siyu Chen, Shujie Cui, Joseph Liu:
A Lightweight Authentication Protocol for 5G Cellular Network Connected Drones. 129-143 - Shankar K. Ghosh, Avirup Das, Sasthi C. Ghosh, Nabanita Das:
Anti-eavesdropping Proportional Fairness Access Control for 5G Networks. 144-158 - Rathindra Nath Dutta, Sasthi C. Ghosh:
Joint Relay Selection and Frequency Allocation for D2D Communications. 159-173
IoT Security and Lightweight Cryptography
- Ziaur Rahman, Xun Yi, Ibrahim Khalil, Mousumi Akter Sumi:
Chaos and Logistic Map Based Key Generation Technique for AES-Driven IoT Security. 177-193 - Junwei Luo, Xun Yi, Fengling Han, Xuechao Yang:
A Usability Study of Cryptographic API Design. 194-213 - Muhammad Rana, Quazi Mamun, Md. Rafiqul Islam:
An S-box Design Using Irreducible Polynomial with Affine Transformation for Lightweight Cipher. 214-227 - Åvald Åslaugson Sommervoll:
The Phantom Gradient Attack: A Study of Replacement Functions for the XOR Function. 228-238
Network Security
- Abhay Kumar, Sandeep K. Shukla:
Topology Validator - Defense Against Topology Poisoning Attack in SDN. 241-260 - Arunavo Dey, Md. Shohrab Hossain, Md. Nazmul Hoq, Suryadipta Majumdar:
Towards an Attention-Based Accurate Intrusion Detection Approach. 261-279 - Yu Liu, Craig A. Shue:
Avoiding VPN Bottlenecks: Exploring Network-Level Client Identity Validation Options. 280-300
Privacy-Preserving Emerging Networked Applications
- Lin Mei, Chungen Xu, Qianmu Li:
Puncturable Search: Enabling Authorized Search in Cross-data Federation. 303-322 - Yu Zhao, Chungen Xu, Lin Mei, Pan Zhang:
Privacy-Preserving Ranked Searchable Encryption Based on Differential Privacy. 323-339 - Viet Vo:
Memory-Efficient Encrypted Search Using Trusted Execution Environment. 340-351
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.