Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
22
views
28
references
Top references
cited by
0
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,380
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Network and System Security : 16th International Conference, NSS 2022, Denarau Island, Fiji, December 9–12, 2022, Proceedings
A Combination Reduction Algorithm and Its Application
other
Author(s):
Wei Yang
,
Shaojun Yang
,
Wei Wu
,
Yong Zhao
Publication date
(Online):
December 07 2022
Publisher:
Springer Nature Switzerland
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Model Reduction of Parametrized Systems 2015
Most cited references
28
Record
: found
Abstract
: not found
Book Chapter
: not found
NTRU: A ring-based public key cryptosystem
Jeffrey Hoffstein
,
Jill Pipher
,
Joseph Silverman
(1998)
0
comments
Cited
150
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book
: not found
A Course in Computational Algebraic Number Theory
Henri Cohen
(1993)
0
comments
Cited
116
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Article
: not found
On lattices, learning with errors, random linear codes, and cryptography
Oded Regev
(2009)
0
comments
Cited
77
times
– based on
0
reviews
Review now
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2022
Publication date (Online):
December 07 2022
Pages
: 667-683
DOI:
10.1007/978-3-031-23020-2_38
SO-VID:
1040ba70-137a-46bb-bfae-9d5ecbf3df9c
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 3
Vulnerability Detection Using Deep Learning Based Function Classification
pp. 23
RAIDER: Reinforcement-Aided Spear Phishing Detector
pp. 51
Network Intrusion Detection Adversarial Attacks for LEO Constellation Networks Based on Deep Learning
pp. 66
A Proof of Concept Implementation of Explainable Artificial Intelligence (XAI) in Digital Forensics
pp. 86
Graph Intelligence Enhanced Bi-Channel Insider Threat Detection
pp. 105
Exploiting Redundancy in Network Flow Information for Efficient Security Attack Detection
pp. 120
A Learning Methodology for Line-Rate Ransomware Mitigation with P4 Switches
pp. 140
Reducing Intrusion Alert Trees to Aid Visualization
pp. 155
Attacker Attribution via Characteristics Inference Using Honeypot Data
pp. 170
Detecting Contradictions from CoAP RFC Based on Knowledge Graph
pp. 193
A First Look at Android Apps’ Third-Party Resources Loading
pp. 214
Comprehensive Mobile Traffic Characterization Based on a Large-Scale Mobile Traffic Dataset
pp. 233
DOT-M: A Dual Offline Transaction Scheme of Central Bank Digital Currency for Trusted Mobile Devices
pp. 249
A Beyond-5G Authentication and Key Agreement Protocol
pp. 267
A Survey on IoT Vulnerability Discovery
pp. 283
Differentiated Security Architecture for Secure and Efficient Infotainment Data Communication in IoV Networks
pp. 305
An Efficient Authenticated Group Key Agreement Protocol with Dynamic Batch Verification for Secure Distributed Networks
pp. 319
Leveraging Frame Aggregation in Wi-Fi IoT Networks for Low-Rate DDoS Attack Detection
pp. 335
Supporting Cyber-Attacks and System Anomaly Detection Research with an Industry 4.0 Dataset
pp. 357
The Force of Compensation, a Multi-stage Incentive Mechanism Model for Federated Learning
pp. 374
A Privacy-Preserving Distributed Machine Learning Protocol Based on Homomorphic Hash Authentication
pp. 387
An Efficient Clustering-Based Privacy-Preserving Recommender System
pp. 406
A Differential Privacy Mechanism for Deceiving Cyber Attacks in IoT Networks
pp. 429
Privacy-Preserving Online Ride-Hailing Matching System with an Untrusted Server
pp. 443
Efficient and Fine-Grained Sharing of Signed Healthcare Data in Smart Healthcare
pp. 459
Enabling Secure Deduplication in Encrypted Decentralized Storage
pp. 476
Geometric Range Searchable Encryption with Forward and Backward Security
pp. 499
Towards Secure and Trustworthy Flash Loans: A Blockchain-Based Trust Management Approach
pp. 514
Forward Traceability for Product Authenticity Using Ethereum Smart Contracts
pp. 524
BSB: Bringing Safe Browsing to Blockchain Platform
pp. 547
Practical Anonymous Multi-hop Locks for Lightning Network Compatible Payment Channel Networks
pp. 561
Blockchain Based Regulatory Technology Deployment for Real Estate Transaction
pp. 580
CVallet: A Blockchain-Oriented Application Development for Education and Recruitment
pp. 598
Decentralized Access Control for Secure Microservices Cooperation with Blockchain
pp. 615
Blockchain-Based Access Control for Secure Smart Industry Management Systems
pp. 633
Driver Locations Harvesting Attack on pRide
pp. 649
Rebound Attacks on \(\textsf{SKINNY}\) Hashing with Automatic Tools
pp. 667
A Combination Reduction Algorithm and Its Application
pp. 687
Evaluating the Security of Merkle-Damgård Hash Functions and Combiners in Quantum Settings
pp. 712
An Efficient Lattice-Based Encrypted Search Scheme with Forward Security
pp. 727
Strengthening the Security of AES Against Differential Fault Attack
Similar content
2,380
Application of artificial intelligence models and optimization algorithms in plant cell and tissue culture
Authors:
Mohsen Hesami
,
Andrew Jones
Combining peak- and chromatogram-based retention time alignment algorithms for multiple chromatography-mass spectrometry datasets
Authors:
Nils Hoffmann
,
Matthias Keck
,
Heiko Neuweger
…
Evaluation of hand-eye and robot-world calibration algorithms for TMS application
Authors:
A. Noccaro
,
L. Raiano
,
G Di Pino
…
See all similar