Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Sankalp Ghatpande"'
Publikováno v:
IEEE Access, Vol 9, Pp 107858-107872 (2021)
Blockchain is increasingly used for registering, authenticating and validating digital assets (financial assets, real estate, etc.) and transactions, governing interactions, recording data and managing identification among multiple parties in a trust
Externí odkaz:
https://doaj.org/article/b22b5b42fe6c47c7b395843344fdb6e2
Publikováno v:
IEEE Access, Vol 9, Pp 107858-107872 (2021)
IEEE Access
IEEE Access, IEEE, 2021, 9, pp.107858-107872. ⟨10.1109/ACCESS.2021.3101044⟩
IEEE Access
IEEE Access, IEEE, 2021, 9, pp.107858-107872. ⟨10.1109/ACCESS.2021.3101044⟩
Blockchain is increasingly used for registering, authenticating and validating digital assets (financial assets, real estate, etc.) and transactions, governing interactions, recording data and managing identification among multiple parties in a trust
Publikováno v:
Future Generation Computer Systems
Future Generation Computer Systems, Elsevier, 2020, 112, pp.283-296. ⟨10.1016/j.future.2020.05.033⟩
info:eu-repo/grantAgreement/EC/H2020/688203
Future Generation Computer Systems, Elsevier, 2020, 112, pp.283-296. ⟨10.1016/j.future.2020.05.033⟩
info:eu-repo/grantAgreement/EC/H2020/688203
International audience; Information is being seen as the new “oil” for companies. Trading and negotiating personal data, which includes data generated by owned smart devices, is gaining attention and acceptance in the Internet of Things (IoT) era
Publikováno v:
Expert Systems with Applications. 211:118704
Blockchain technologies, also known as Distributed Ledger Technologies (DLT), are increasingly being explored in many applications, especially in the presence of (potential) dis-/mis-/un-trust among organizations and individuals. Today, there exists
Publikováno v:
In O., Blazy & C. Y., Yeun (Eds.), Information Security Theory and Practice, 12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels, Belgium, December 10-11, 2018, Proceedings (pp. 193-206). Springer Verlag (2018).
Information Security Theory and Practice ISBN: 9783030200732
WISTP
Information Security Theory and Practice ISBN: 9783030200732
WISTP
We introduce a set of four twisted Edwards curves that satisfy common security requirements and allow for fast implementations of scalar multiplication on 8, 16, and 32-bit processors. Our curves are defined by an equation of the form \(-x^2 + y^2 =
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::5f7873154d7dc6f09404f1e841901eca
http://orbilu.uni.lu/handle/10993/39121
http://orbilu.uni.lu/handle/10993/39121
Publikováno v:
ARES
With the surge of data breaches, practitioner ignorance and unprotected hardware, secure information management in healthcare environments is becoming a challenging problem. In the context of healthcare systems, confidentiality of patient data is of
Autor:
Kisub Kim, Sankalp Ghatpande, Kui Liu, Anil Koyuncu, Dongsun Kim, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon
Publikováno v:
info:eu-repo/grantAgreement/EC/H2020/949014
Journal of Systems and Software
Journal of Systems and Software
Bug localization is a recurrent maintenance task in software development. It aims at identifying relevant code locations (e.g., code files) that must be inspected to fix bugs. When such bugs are reported by users, the localization process become ofte