Most Cited Papers In Last Two Years
Articles Showing 20 results
Sort by
EFAW: a new mining attack model combining FAW attacks with the Eclipse attack
Open Access Original Article 20 Dec 2023
Views: Downloads:
Zero knowledge registration of PKI authentication for symbiotic security in FIDO IoT
Open Access Original Article 14 Dec 2023
Views: Downloads:
Towards a cryptography encyclopedia: a survey on attribute-based encryption
Open Access Survey 12 Dec 2023
Views: Downloads:
Blockchain distributed identity management model for cross-border data privacy protection
Open Access Original Article 10 Dec 2023
Views: Downloads:
On the additive differential probability of ARX construction
Open Access Original Article 28 Nov 2023
Views: Downloads:
Split keys for station-to-station (STS) protocols
Open Access Original Article 21 Sep 2023
Views: Downloads:
Graph neural network based function call graph embedding for malware classification
Open Access Original Article 29 Jun 2023
Views: Downloads:
Resist the type of BWH attack: through introducing discount factor and withdrawal threshold into Bitcoin
Open Access Original Article 10 May 2023
Views: Downloads:
Adaptive mining difficulty for blockchain to resist selfish mining attack
Open Access Original Article 8 May 2023
Views: Downloads:
Towards the creation of the future fish farm
Open Access Original Article 31 Dec 2022
Views: Downloads:
Anatomy of attacks on IoT systems: review of attacks, impacts and countermeasures
Open Access Original Article 4 Dec 2022
Views: Downloads:
Risk assessment and control selection for cyber-physical systems: a case study on supply chain tracking systems
Open Access Original Article 27 Oct 2022
Views: Downloads:
Evaluating the performance of post-quantum secure algorithms in the TLS protocol
Open Access Original Article 28 Sep 2022
Views: Downloads:
A comparison study to detect seam carving forgery in JPEG images with deep learning models
Open Access Original Article 23 Aug 2022
Views: Downloads:
A data-centric approach to the study of system-level prognostics for cyber physical systems: application to safe UAV operations
Open Access Original Article 29 Jun 2022
Views: Downloads:
Advanced fault-tolerant visual multi-secret sharing scheme
Open Access Original Article 19 May 2022
Views: Downloads:
Aviation attacks based on ILS and VOR vulnerabilities
Open Access Original Article 29 Apr 2022
Views: Downloads:
Multi-level storage based auditing scheme for 5G and beyond defined edge computing
Open Access Original Article 30 Mar 2022
Views: Downloads:
- 1
- 2