?
Lecture Notes in Networks and Systems; Proceedings of the Tenth International Conference on Mathematics and Computing ,
7
Guarding the Beats by Defending Resource Depletion Attacks ..:
, In:
?
Lecture Notes in Networks and Systems; Proceedings of the Tenth International Conference on Mathematics and Computing ,
8
Key-Dependent Dynamic SBox for KASUMI Block Cipher:
, In:
?
Lecture Notes in Networks and Systems; Proceedings of the Tenth International Conference on Mathematics and Computing ,
10
Deep Learning-Based Differential Distinguishers for NIST St..:
, In:
?
Information Security and Cryptology; Lecture Notes in Computer Science ,
11
Non-malleable Codes from Leakage Resilient Cryptographic Pr..:
, In:
?
2023 20th Annual International Conference on Privacy, Security and Trust (PST) ,
12
Unmasking the Dominant Threat of Data Manipulation Attack o..:
, In:
?
14
Cellular Automata and Discrete Complex Systems: 29th IFIP W..
Lecture Notes in Computer Science, 14152
?
Visualization Techniques for Climate Change with Machine Learning and Artificial Intelligence ,
15