-
1
New Counterexamples to Sequential Composition Adaptive Insecurity
Published 2025-01-01Subjects: “…Non-adaptive security…”
Get full text
Article -
2
Adaptively secure, splittable, and robust threshold unsigncryption
Published 2025-05-01Subjects: Get full text
Article -
3
AI-Driven Phishing Detection: Enhancing Cybersecurity with Reinforcement Learning
Published 2025-05-01Subjects: Get full text
Article -
4
A Literature Review on Security in the Internet of Things: Identifying and Analysing Critical Categories
Published 2025-02-01Subjects: Get full text
Article -
5
Comprehensive Review on Facets of Cloud Computing in Context of Security and Privacy
Published 2025-07-01Subjects: Get full text
Article -
6
Adaptively secure attribute-based encryption for traitor tracing
Published 2016-01-01Subjects: “…attribute-based encryption;traitor tracing;dual system encryption;adaptive security;collusion secure code…”
Get full text
Article -
7
Adaptively secure key-policy ABE scheme with fast decryption
Published 2014-11-01Subjects: “…attribute-based encryption;key-policy;adaptive security;fast decryption;composite order;standard model…”
Get full text
Article -
8
Adaptively secure attribute-based encryption for traitor tracing
Published 2016-01-01Subjects: Get full text
Article -
9
Resilient Topology Reconfiguration for Industrial Internet of Things: A Feature-Driven Approach Against Heterogeneous Attacks
Published 2025-05-01Subjects: “…adaptive security…”
Get full text
Article -
10
Comparative analysis of security models in cloud platforms
Published 2024-06-01Subjects: Get full text
Article -
11
Multi-authority attribute-based access control system in mHealth with traceability
Published 2018-06-01Subjects: Get full text
Article