-
321
New method for file deduplication in cloud storage
Published 2017-03-01Subjects: “…encrypted data…”
Get full text
Article -
322
Scheme for identifying malware traffic with TLS data based on machine learning
Published 2020-02-01Subjects: Get full text
Article -
323
Information Security and Artificial Intelligence–Assisted Diagnosis in an Internet of Medical Thing System (IoMTS)
Published 2024-01-01Subjects: Get full text
Article -
324
Measurement and evaluation for privacy benefits of deploying encrypted DNS protocol between recursive and authoritative servers
Published 2024-10-01Subjects: Get full text
Article -
325
High capacity reversible hiding in encrypted domain based on cipher-feedback secret sharing
Published 2023-09-01Subjects: Get full text
Article -
326
Research on quantum key distribution technology in intelligent substation
Published 2018-10-01Subjects: Get full text
Article -
327
Survey of encrypted malicious traffic detection based on deep learning
Published 2020-06-01Subjects: “…encrypted traffic…”
Get full text
Article -
328
Trusted access scheme for intranet mobile terminal based on encrypted SD card
Published 2019-08-01Subjects: Get full text
Article -
329
Survey of side channel attack on encrypted network traffic
Published 2021-08-01Subjects: Get full text
Article -
330
Flow-based electronic resource network behavior analysis practice
Published 2024-11-01Subjects: Get full text
Article -
331
Predictions for 2025: Artificial Intelligence in Modern Drug Development, Quantum Proof Encryption, and Health Data Monetization
Published 2024-12-01Subjects: Get full text
Article -
332
Reversible data hiding in encrypted images based on additive homomorphic encryption and multi-MSB embedding
Published 2023-08-01Subjects: Get full text
Article -
333
Measurement of video initial buffer size for mobile network
Published 2019-10-01Subjects: Get full text
Article -
334
New construction of secure range query on encrypted data in cloud computing
Published 2015-02-01Subjects: Get full text
Article -
335
Identity-based domain key distribution protocol in the E-document security management
Published 2012-05-01Subjects: Get full text
Article -
336
Lightweight AES Design for IoT Applications: Optimizations in FPGA and ASIC With DFA Countermeasure Strategies
Published 2025-01-01Subjects: “…Advanced encryption standard (AES)…”
Get full text
Article -
337
Research prospects of user information detection from encrypted traffic of mobile devices
Published 2021-02-01Subjects: Get full text
Article -
338
A New Website Fingerprinting Method for Tor Hidden Service
Published 2025-01-01Subjects: Get full text
Article -
339
Study on privacy preserving encrypted traffic detection
Published 2021-08-01Subjects: Get full text
Article -
340
Reversible data hiding algorithm in encrypted images based on prediction error and bitplane coding
Published 2023-12-01Subjects: Get full text
Article