DIKUL - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov UL. Za polni dostop se PRIJAVITE.

1 2
zadetkov: 17
1.
  • Anonymous Counting Problem ... Anonymous Counting Problem in Trust Level Warning System for VANET
    Yeung, Cheuk Yu; Hui, Lucas Chi Kwong; Chim, Tat Wing ... IEEE transactions on vehicular technology, 2019-Jan., 2019-1-00, 20190101, Letnik: 68, Številka: 1
    Journal Article
    Recenzirano

    Using vehicular ad-hoc network, smart vehicles can detect dangerous events on the road and announce warnings to other vehicles to ensure road safety. The other vehicles nearby may receive the warning ...
Celotno besedilo
Dostopno za: UL
2.
  • New Differential Cryptanaly... New Differential Cryptanalytic Results for Reduced-Round CAST-128
    WANG, Meiqin; WANG, Xiaoyun; CHOW, Kam Pui ... IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2010, Letnik: E93.A, Številka: 12
    Journal Article
    Recenzirano

    CAST-128 is a block cipher used in a number of products, notably as the default cipher in some versions of GPG and PGP. It has been approved for Canadian government use by the Communications Security ...
Celotno besedilo
Dostopno za: UL
3.
  • Cryptology and Network Secu... Cryptology and Network Security
    Hutchison, David; Kanade, Takeo; Kittler, Josef 2008, 2009-05-11, Letnik: 5339
    eBook

    This book constitutes the refereed proceedings of the 7th International Conference on Cryptology & Network Security, held in Hong Kong in 2008. The papers are organized in sections on cryptosystems, ...
Celotno besedilo
Dostopno za: UL
4.
  • k-Dimensional hashing schem... k-Dimensional hashing scheme for hard disk integrity verification in computer forensics
    Jiang, Zoe Lin; Fang, Jun-bin; Hui, Lucas Chi Kwong ... Frontiers of information technology & electronic engineering, 10/2011, Letnik: 12, Številka: 10
    Journal Article
    Recenzirano

    Verifying the integrity of a hard disk is an important concern in computer forensics, as the law enforcement party needs to confirm that the data inside the hard disk have not been modified during ...
Celotno besedilo
Dostopno za: UL
5.
  • A Light-Weight Crowdsourcing Aggregation in Privacy-Preserving Federated Learning System
    Zhang, Ke; Yiu, Siu Ming; Hui, Lucas Chi Kwong 2020 International Joint Conference on Neural Networks (IJCNN), 2020-July
    Conference Proceeding

    Federated Machine Learning (FML) sheds light on secure distributed machine learning. However, generic FML methods may lead to privacy-leakage through the sharing of training information of individual ...
Celotno besedilo
Dostopno za: UL
6.
  • Proceedings of the 6th ACM ... Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
    03/2011
    Conference Proceeding
    Odprti dostop

    The 6th ACM Symposium on Information, Computer and Communication Security (ASIACCS 2011) was held in Hong Kong, China, on 22-24 March 2011. The conference was sponsored by the ACM Special Interest ...
Celotno besedilo
Dostopno za: UL
7.
  • SPCS: Secure and Privacy-Pr... SPCS: Secure and Privacy-Preserving Charging-Station Searching using VANET
    Chim, Tat Wing; Cheung, Jeanno Chin Long; Yiu, Siu Ming ... Journal of information security, 2012, Letnik: 3, Številka: 1
    Journal Article
    Odprti dostop

    Electric vehicle has attracted more and more attention all around the world in recent years because of its many advantages such as low pollution to the environment. However, due to the limitation of ...
Celotno besedilo
Dostopno za: UL

PDF
8.
  • Designing a system infrastr... Designing a system infrastructure for distributed programs
    Lam, Kwok-Yan; Hui, Lucas Chi-Kwong Computer communications, 08/1996, Letnik: 19, Številka: 9
    Journal Article
    Recenzirano

    A distributed program is one that consists of several components distributed over a network of computers. The reliability of a distributed program is strongly affected by the behaviour of the ...
Celotno besedilo
Dostopno za: UL
9.
  • Analyzing self-adjusting li... Analyzing self-adjusting linear list algorithms with deletions and unsuccessful searches
    Lucas Chi Kwong Hui; Martel, Charles U. Information processing letters, 06/1996, Letnik: 58, Številka: 5
    Journal Article
    Recenzirano

    In (Hui and Martel, 1993), we designed and analyzed efficient self-adjusting linear list algorithms. Our analysis proves that a self-adjusting linear list algorithm, MP, is competitive to a large ...
Celotno besedilo
Dostopno za: UL
10.
Celotno besedilo
Dostopno za: UL
1 2
zadetkov: 17

Nalaganje filtrov