Your selections:
A blockchain-based framework for automatic SLA management in fog computing environments
- Battula, Sudheer, Garg, Saurabh, Naha, Ranesh, Amin, Muhammad, Kang, Byeong, Aghasian, Erfan
- Patwary, Abdullah Al-Noman, Naha, Ranesh Kumar, Garg, Saurabh, Battula, Sudheer Kumar, Patwary, Md Anwarul Kaium, Aghasian, Erfan, Amin, Muhammad Bilal, Mahanti, Aniket, Gong, Mingwei
Novel one time signatures (NOTS) : a compact post-quantum digital signature scheme
- Shahid, Furqan, Ahmad, Iftikhar, Imran, Muhammad, Shoaib, Muhammad
S-boxes construction based on quantum chaos and PWLCM chaotic mapping
- Peng, Jun, Pang, Shaoning, Zhang, Du, Jin, Shangzhu, Feng, Lixiao, Li, Zuojin
Cryptography-based secure data storage and sharing using HEVC and public clouds
- Usman, Muhammad, Ahmad Jan, Mian, He, Xiangjian
Anti-analysis trends in banking malware
An interesting cryptography study based on knapsack problem
Verifiable and privacy preserving electronic voting with untrusted machines
- Murshed, Manzur, Sabrina, Tishna, Iqbal, Anindya, Ali, Mortuza
Managing privacy, trust, security, and context relationships using weighted graph representations
- Skinner, Geoff, Miller, Mirka
On network security and internet vulnerability
- Miller, Mirka, Patel, Deval, Patel, Keyurkumar
Are you sure you would like to clear your session, including search history and login status?