A improved group quantum key distribution protocol with multi-party collaboration. [PDF]
Yuan Q +5 more
europepmc +1 more source
Evading Antivirus Detection Using Fountain Code-Based Techniques for Executing Shellcodes. [PDF]
Huang GC, Chang KC, Lai TH.
europepmc +1 more source
Security Challenges Toward In-Sensor Computing Systems. [PDF]
Kajol M, Chennagouni N, Lu W, Yu Q.
europepmc +1 more source
Privacy protection of communication networks using fully homomorphic encryption based on network slicing and attributes. [PDF]
Wang W, Liu R, Cheng S.
europepmc +1 more source
Multi-Party Semi-Quantum Simultaneous Ascending Auction Protocol Based on Single-Particle States. [PDF]
Wu X, Yang Y, Wang B, Zhang Y, Han Y.
europepmc +1 more source
Σύστημα ανίχνευσης για hardware trojans
Η επιστήμη της τεχνολογίας αυξάνεται ραγδαία μέρα με τη μέρα. Δυστυχώς όμως όλες αυτές οι νέες τεχνολογικές τάσεις μπορεί να κρύβουν δυσάρεστες «εκπλήξεις». Τα τελευταία χρόνια οι ασύρματες επικοινωνίες έχουν γίνει ένα πολύ σημαντικό κομμάτι της καθημερινότητάς μας. Εμπιστευόμαστε τις ασύρματες συσκευές μας και τις εταιρίες που τις παρέχουν.
openaire +1 more source
Surgical revision in the presence of an S. aureus infection increases virulence factor expression and activates a multi-tissue inflammatory response. [PDF]
Smith CJ +10 more
europepmc +1 more source
Network security analysis based on feature selection and optimized fireworks algorithm. [PDF]
Zhou L +5 more
europepmc +1 more source
Realistic vulnerabilities of decoy-state quantum key distribution. [PDF]
Sushchev I +8 more
europepmc +1 more source
Autonomous recognition of erroneous raw key bit bias in quantum key distribution. [PDF]
Young M, Lucamarini M, Pirandola S.
europepmc +1 more source

