標(biāo)題: Titlebook: Information Systems Design and Intelligent Applications; Proceedings of Third Suresh Chandra Satapathy,Jyotsna Kumar Mandal,Vikr Conference [打印本頁(yè)] 作者: 夸大 時(shí)間: 2025-3-21 20:05
書(shū)目名稱Information Systems Design and Intelligent Applications影響因子(影響力)
書(shū)目名稱Information Systems Design and Intelligent Applications影響因子(影響力)學(xué)科排名
書(shū)目名稱Information Systems Design and Intelligent Applications網(wǎng)絡(luò)公開(kāi)度
書(shū)目名稱Information Systems Design and Intelligent Applications網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書(shū)目名稱Information Systems Design and Intelligent Applications被引頻次
書(shū)目名稱Information Systems Design and Intelligent Applications被引頻次學(xué)科排名
書(shū)目名稱Information Systems Design and Intelligent Applications年度引用
書(shū)目名稱Information Systems Design and Intelligent Applications年度引用學(xué)科排名
書(shū)目名稱Information Systems Design and Intelligent Applications讀者反饋
書(shū)目名稱Information Systems Design and Intelligent Applications讀者反饋學(xué)科排名
作者: 有罪 時(shí)間: 2025-3-21 21:03
An Effective Approach for Providing Diverse and Serendipitous Recommendations,ut, the current state of recommender system fails to suggest relevant items that are unknown (novel) and surprising (serendipitous) for its users. Therefore, we proposed a new approach that takes as input the positive ratings of the user, positive ratings of the similar users and negative ratings of作者: Plaque 時(shí)間: 2025-3-22 00:47 作者: 萬(wàn)神殿 時(shí)間: 2025-3-22 05:04 作者: ANTE 時(shí)間: 2025-3-22 10:43
Design of a Low-Delay-Write Model of a TMCAM,om the connections of circuit and majorly due to the exceptional operational features of CAM integrated with MTJ. While the previous TMCAM required each one of the MTJ to be written separately, this model attempts to nullify the problem. Consequently, a reduction in delay by almost twice is obtained作者: 蜈蚣 時(shí)間: 2025-3-22 13:08 作者: 能得到 時(shí)間: 2025-3-22 18:09 作者: explicit 時(shí)間: 2025-3-23 00:33 作者: 勛章 時(shí)間: 2025-3-23 03:10 作者: 含鐵 時(shí)間: 2025-3-23 09:19
Design of Wireless Sensor Network Based Embedded Systems for Aquaculture Environment Monitoring,loped system will have many applications particularly in the area of aquaculture, tea plantations, vineyards, precision agriculture, green houses monitoring etc. The complexity of the system increases for applications involving aquaculture. The developed systems are tailored for sensing in wide farm作者: 男生戴手銬 時(shí)間: 2025-3-23 09:42 作者: charisma 時(shí)間: 2025-3-23 17:43 作者: 閑蕩 時(shí)間: 2025-3-23 22:05
Evaluation of Glomerular Filtration Rate by Single Frame Method Applying GATES Formula,mpare it with GFR calculated by grouping frames. The DICOM image has number of frames in which the timely report of the activity of tracer is acquired accordingly at various instances of frames. Here we take a single frame from an image collection of 60 frames where the activity of the radio tracer 作者: 保守 時(shí)間: 2025-3-23 23:32
Design and Development of Cost Effective Wearable Glove for Automotive Industry,he help of any automation technique. In this paper, a cost effective wearable glove for monitoring automotive parameters such as temperature, flaw detection, Electro Motive Force (EMF) leakage and Direct Current (DC) measurement etc. To perform these measurements, various sensor units like temperatu作者: 歪曲道理 時(shí)間: 2025-3-24 03:55
Tampering Localization in Digital Image Using First Two Digit Probability Features,sis shows that, first two digits probabilities get significantly affected by tampering operations. Thus, prima facie tampering can be efficiently localized using this smaller feature set, effectively reducing localization time. We trained SVM classifier using the first two digit probabilities of sin作者: 不要嚴(yán)酷 時(shí)間: 2025-3-24 08:50
Classification of Bank Direct Marketing Data Using Subsets of Training Data,and Financial Industry. A classification technique using subsets of training data has been proposed in this paper. We have used a real-world direct marketing campaign data for experimentation. This marketing campaign was a telemarketing campaign. The objective of our experiment is to forecast the pr作者: 方舟 時(shí)間: 2025-3-24 10:39
,Offline Writer Identification and Verification—A State-of-the-Art,a scan etc. The same can be used applied on handwriting analysis. The Automatic Writer Identification and Verification (AWIV) is a study which combines forensic analysis field and computer vision and pattern recognition field. This paper presents a survey of literature on the offline handwritten wri作者: 后天習(xí)得 時(shí)間: 2025-3-24 15:15 作者: 注意 時(shí)間: 2025-3-24 20:26 作者: FELON 時(shí)間: 2025-3-25 02:05
s, so-called macroblocks, and is mainly divided into four operations: color conversion, Discrete Cosine Transform (DCT), quantization and entropic encoding. This operation is carried out easily on non-encrypted image. In this paper, we consider the case where such an execution is done in the encrypt作者: occult 時(shí)間: 2025-3-25 06:37 作者: Essential 時(shí)間: 2025-3-25 09:53
Ivy Jain,Hitesh Hasijampromised device can potentially overtake the whole infrastructure, especially considering clone attacks..To counter attacks, we propose a network architecture which enhances flat networks, especially mesh networks, with isolation and automatic containment of malicious devices. Our approach consists作者: CRAFT 時(shí)間: 2025-3-25 14:23 作者: 種屬關(guān)系 時(shí)間: 2025-3-25 15:48
Minal Lopes,Nisha Sarwades the users’ privacy, while guaranteeing its authenticity. Garms and Lehmann (PKC’19) introduced a new type of group signatures that balance privacy with utility by allowing to selectively link subsets of the group signatures via an oblivious entity, the converter. The conversion takes a batch of gr作者: 征稅 時(shí)間: 2025-3-25 20:57
N. S. Ranjan,Soumitra Pal,Aminul Islam computers. One of the Round?3 candidates of the ongoing NIST post-quantum standardization effort is .. It was designed to provide conservative security, which comes with the caveat that implementations are often bigger and slower compared to alternative schemes. In particular, the most time-consumi作者: osculate 時(shí)間: 2025-3-26 03:13 作者: 嚙齒動(dòng)物 時(shí)間: 2025-3-26 04:28
Swati Hira,Anita Bai,P. S. Deshpandesed to improve trust in new Post-Quantum (PQ) schemes and smooth the transition to PQ cryptography. In particular, several ways to combine key exchange mechanisms (KEMs) into a secure hybrid KEM have been proposed. In this work, we observe that most PQ KEMs are built using a variant of the Fujisaki-作者: Organization 時(shí)間: 2025-3-26 09:24
Anitha Mary M. O. Chacko,K. S. Anil Kumarsed to improve trust in new Post-Quantum (PQ) schemes and smooth the transition to PQ cryptography. In particular, several ways to combine key exchange mechanisms (KEMs) into a secure hybrid KEM have been proposed. In this work, we observe that most PQ KEMs are built using a variant of the Fujisaki-作者: debris 時(shí)間: 2025-3-26 14:06
Abdullah Akbar,S. Mahaboob Basha,Syed Abdul Sattarer prove possession of this certified credential to another party, while minimizing the information given to the latter. At CANS 2010, Guajardo, Mennink and Schoenmakers have introduced the concept of anonymous credential schemes with encrypted attributes, where the attributes to be certified are en作者: Crepitus 時(shí)間: 2025-3-26 16:58 作者: Resection 時(shí)間: 2025-3-26 21:48 作者: 緯線 時(shí)間: 2025-3-27 04:46 作者: 憤世嫉俗者 時(shí)間: 2025-3-27 08:54 作者: 勛章 時(shí)間: 2025-3-27 09:34
Manoharan Sangeetha,Gautham Raj Vijayaragavan,R. L. Raghav,K. P. Phanicess to information. This paper introduces the design and implementation of the GNU Name System (GNS), a fully decentralized and censorship-resistant name system. GNS provides a privacy-enhancing alternative to DNS which preserves the desirable property of memorable names. Due to its design, it can 作者: 繁榮地區(qū) 時(shí)間: 2025-3-27 15:53 作者: 行乞 時(shí)間: 2025-3-27 21:07 作者: fidelity 時(shí)間: 2025-3-27 22:34 作者: 心胸開(kāi)闊 時(shí)間: 2025-3-28 02:29
Swarnendu Ghosh,Nibaran Das,Mahantapas Kundu,Mita Nasipuriogress has been made towards reducing processing overheads, STC still incurs significant communication overhead that is in fact prohibitive when no high-speed network connection is available, e.g., when applications are run over a cellular network. In this paper, we consider the fundamental problem 作者: Innovative 時(shí)間: 2025-3-28 09:57 作者: 欺騙世家 時(shí)間: 2025-3-28 13:41 作者: antidepressant 時(shí)間: 2025-3-28 17:07 作者: 指派 時(shí)間: 2025-3-28 18:52
Suresh Chandra Satapathy,Jyotsna Kumar Mandal,VikrCovers novel and original.research in computer science and information technology.on topics like natural language processing, artificial intelligence, cyber.forensics, software engineering and virtual作者: 鋼筆記下懲罰 時(shí)間: 2025-3-28 23:26 作者: Adrenaline 時(shí)間: 2025-3-29 03:39
Information Systems Design and Intelligent ApplicationsProceedings of Third作者: cultivated 時(shí)間: 2025-3-29 08:33
Conference proceedings 2016ing,intelligent computing for GIS and remote sensing, bio-informatics andbio-computing. These fields are not only limited to computer researchers butalso include mathematics, chemistry, biology, bio-chemistry, engineering,statistics, and all others in which computer techniques may assist..作者: 嬉耍 時(shí)間: 2025-3-29 15:19
data usability..In this context, one of the main cryptographic tool is (fully) homomorphic encryption (FHE), that permits to perform operations while keeping the data encrypted. We here consider two different instantiations of FHE, one for which the plaintext space is binary (.) and the other a mod作者: 會(huì)犯錯(cuò)誤 時(shí)間: 2025-3-29 16:15
Dac-Nhuong Le,Vo Nhan Van,Trinh Thi Thuy Giang data usability..In this context, one of the main cryptographic tool is (fully) homomorphic encryption (FHE), that permits to perform operations while keeping the data encrypted. We here consider two different instantiations of FHE, one for which the plaintext space is binary (.) and the other a mod作者: 輕快帶來(lái)危險(xiǎn) 時(shí)間: 2025-3-29 22:07
Ivy Jain,Hitesh Hasija mesh networks?[., .,.,.] relied on a single point-of-failure and is, thus, not intrusion or malware tolerant..Our architecture is dynamic in the sense that bridge devices can change, misbehaving devices can be isolated by outvoting them, and cryptographic keys evolve. This effectively turns the ent作者: Contend 時(shí)間: 2025-3-30 03:16
Khushboo Pachori,Amit Mishra,Rahul Pachauri,Narendra Singh data usability..In this context, one of the main cryptographic tool is (fully) homomorphic encryption (FHE), that permits to perform operations while keeping the data encrypted. We here consider two different instantiations of FHE, one for which the plaintext space is binary (.) and the other a mod作者: MONY 時(shí)間: 2025-3-30 05:46 作者: artless 時(shí)間: 2025-3-30 09:15
N. S. Ranjan,Soumitra Pal,Aminul Islamprove over the state-of-the-art implementation with a row-wise blocking and packing approach, denoted as RWCF in the following. For the matrix multiplication in ., this results in a factor two speed-up. The impact of these improvements on the full decapsulation operation is up?to 22%. We additionall作者: 單獨(dú) 時(shí)間: 2025-3-30 13:46
Mridul Paul,Ajanta Dasnt in the public key size but also in the signature size when used in the right setting..However, constructions based on the higher-bit approximate ISIS save memory space at the expense of loosening security. Parameters must be set in regards with this trade-off.作者: 職業(yè)拳擊手 時(shí)間: 2025-3-30 17:15
Swati Hira,Anita Bai,P. S. Deshpandef our combiners as a proof-of-concept and benchmark it. More precisely, we build a hybrid IND-CCA KEM from the CPA-secure versions of HQC and LAC, two NIST Round 2 PQ proposals. We show that the resulting KEM offers comparable performances to HQC, thus improving security at a small cost. Finally, we作者: 傳授知識(shí) 時(shí)間: 2025-3-30 23:26
Anitha Mary M. O. Chacko,K. S. Anil Kumarf our combiners as a proof-of-concept and benchmark it. More precisely, we build a hybrid IND-CCA KEM from the CPA-secure versions of HQC and LAC, two NIST Round 2 PQ proposals. We show that the resulting KEM offers comparable performances to HQC, thus improving security at a small cost. Finally, we作者: 拖債 時(shí)間: 2025-3-31 00:57
Abdullah Akbar,S. Mahaboob Basha,Syed Abdul Sattar this problem: our multi-show anonymous credential scheme with encrypted attributes relies on the non-interactive Groth-Sahai proof system and the recent work on commuting signatures from Fuchsbauer (Eurocrypt 2011) and is proven secure in the standard model.作者: 外形 時(shí)間: 2025-3-31 09:02 作者: Daily-Value 時(shí)間: 2025-3-31 11:21
Mitali Sinha,Suman Deb,Sonia Nandia, Ohashi and Minematsu. By applying the method, the security bounds of GCM can be improved by a factor of around 2.. Lastly, we show that these forgery attacks will still succeed if GCM adopts MAC-then-Enc paradigm to protect its MAC scheme as one of the options mentioned in previous papers.作者: 不可救藥 時(shí)間: 2025-3-31 13:21
Sonia Nandi,Suman Deb,Mitali Sinha which is provably secure in the g-eCK model without random oracles. Security of proposed protocol is reduced to the hardness of Cube Bilinear Decisional Diffie-Hellman (CBDDH) problem for symmetric pairing. We also extend the proposed 3AKE scheme to a GAKE scheme with more than three group members,作者: Initial 時(shí)間: 2025-3-31 19:22 作者: 量被毀壞 時(shí)間: 2025-3-31 22:11
Manoharan Sangeetha,Gautham Raj Vijayaragavan,R. L. Raghav,K. P. Phanind memorable mapping without a trusted authority. GNS uses the transitivity in the SDSI design to replace the trusted root with secure delegation of authority, thus making petnames useful to other users while operating under a very strong adversary model. In addition to describing the GNS design, we作者: 帶傷害 時(shí)間: 2025-4-1 04:02 作者: crucial 時(shí)間: 2025-4-1 07:32
Debaditya Barman,Kamal Kumar Shaw,Anil Tudu,Nirmalya Chowdhuryns, by replacing them with precomputed values. We note that a number of well-known and widely-used crypto libraries are subject to this vulnerability.In addition to such a vulnerability, we describe some other minor optimizations that an attacker can exploit to reduce even more the key derivation ti