Font Size: a A A
Keyword [Adversaries]
Result: 1 - 12 | Page: 1 of 1
1. A Framework For T-out-of-n Oblivious Transfer With Security Against Covert Adversaries
2. Security Threshold Identity Based Decryption Scheme
3. Research Of Network Security Based On Random Network Coding
4. Blockchain Based Privacy Preservation In Edge Computing Paradigms
5. A control theory based hybrid architecture to anticipate and shape adversarial behavior
6. Adversaries in networks
7. Addressing automated adversaries of network applications
8. Thwarting Adversaries with Unpredictability: Massive-scale Game-Theoretic Algorithms for Real-world Security Deployments
9. Methods Development for Optimal Defense against Adaptive Adversaries -- Quantification of Uncertain Preferences and Development of Computational Approaches
10. A holistic approach to secure sensor networks
11. Managing Quality, Identity and Adversaries in Public Discourse with Machine Learning
12. Wireless Secret Key Generation Versus Capable Adversaries
  <<First  <Prev  Next>  Last>>  Jump to