From post

An Efficient Construction of a Compression Function for Cryptographic Hash.

, , и . CD-ARES, том 9817 из Lecture Notes in Computer Science, стр. 124-140. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Improved Sparse Coding Algorithm with Device-Free Localization Technique for Intrusion Detection and Monitoring., , , , и . Symmetry, 11 (5): 637 (2019)CCBRSN: A System with High Embedding Capacity for Covert Communication in Bitcoin., и . SEC, том 580 из IFIP Advances in Information and Communication Technology, стр. 324-337. Springer, (2020)ANCS: Automatic NXDomain Classification System Based on Incremental Fuzzy Rough Sets Machine Learning., , , , , , и . IEEE Trans. Fuzzy Syst., 29 (4): 742-756 (2021)Am I eclipsed? A smart detector of eclipse attacks for Ethereum., , , , , , и . Comput. Secur., (2020)A Distributed Privacy-Preserving Association Rules Mining Scheme Using Frequent-Pattern Tree., и . ADMA, том 5139 из Lecture Notes in Computer Science, стр. 170-181. Springer, (2008)Special issue on security and privacy of blockchain technologies., , , , и . Int. J. Inf. Sec., 19 (3): 243-244 (2020)Mining for Better: An Energy-Recycling Consensus Algorithm to Enhance Stability with Deep Learning., , , , , , , , и . ISPEC, том 14341 из Lecture Notes in Computer Science, стр. 579-594. Springer, (2023)Privacy-preserving Blockchain-based Global Data Sharing for Federated Learning with Non-IID Data., , и . ICDCS Workshops, стр. 193-198. IEEE, (2022)FlowADGAN: Adversarial Learning for Deep Anomaly Network Intrusion Detection., , , , и . STM, том 13867 из Lecture Notes in Computer Science, стр. 156-174. Springer, (2022)Analysis of Path ORAM toward Practical Utilization., , , и . NBiS, стр. 646-651. IEEE Computer Society, (2015)