Citation Details

Book

Information and Communications Security

2018, Volume 11149

ISBN : 978-3-030-01949-5

243 Items cite this Book and its Chapters

Page: 1 | 2 | 3 | > | >>

Conference Paper

Sparrow: Flexible Memory Deduplication in Android Systems with Similar-Page Awareness

Guangyu Wei, Changlong Li, Rui Xu, Qingfeng Zhuge and Edwin H.-M. Sha

Conference: 2024 Design, Automation & Test in Europe Conference & Exhibition (DATE), Year: 2024, Page 1

Read Online

Chapter

Codes, Cryptology and Information Security

George Teşeleanu

Series: Lecture Notes in Computer Science, Year: 2019, Volume 11445, Page 92

Read Online

Conference Paper

Fully Homomorphic Encryption Accelerator Using DSP Embedded Multiplier

Shakirah Hashim and Mohammed Benaissa

Conference: 2023 15th International Conference on Computer Research and Development (ICCRD), Year: 2023, Page 278

Read Online

Chapter

Progress in Cryptology – LATINCRYPT 2023

Kohei Nakagawa, Atsushi Fujioka, Akira Nagai, Junichi Tomida, Keita Xagawa and Kan Yasuda

Series: Lecture Notes in Computer Science, Year: 2023, Volume 14168, Page 171

Read Online

Article

Cryptographic Design of PriCloud, a Privacy-preserving Decentralized Storage with Remuneration

Henning Kopp, David Modinger, Franz J. Hauck and Frank Kargl

Journal: IEEE Transactions on Dependable and Secure Computing, 2019, Page 1

Read Online

Conference Paper

A Multi-feature-based Approach to Malicious Domain Name Identification from DNS Traffic

Chen Zhao, Yongzheng Zhang, Tianning Zang, Yige Chen and Yipeng Wang

Conference: 2020 27th International Conference on Telecommunications (ICT), Year: 2020, Page 1

Read Online

Chapter

Information and Communications Security

George Teşeleanu

Series: Lecture Notes in Computer Science, Year: 2020, Volume 12282, Page 386

Read Online

Conference Paper

A Novel Violation Tracing Model for Cloud Service Accountability

Xiaojian Li, Bo Li, Hailan Wang, Jiajia Zhang, Haopeng Yang and Jingang Liu

Conference: 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Year: 2020, Page 744

Read Online

Article

Randpay: The Technology for Blockchain Micropayments and Transactions Which Require Recipient's Consent

Oleksii Konashevych and Oleg Khovayko

Journal: SSRN Electronic Journal , 2020

Read Online

Article

Chosen-Ciphertext Secure Key Encapsulation Mechanism in the Standard Model

Shengfeng Xu and Xiangxue Li

Journal: IEEE Access, 2021, Volume 9, Page 13683

Read Online

Citations per year

20222023

citing journals

See More
See Less

citing books

See More
See Less