This paper describes a constant-time lattice encoder for the NIST-recomm...
In this paper, we introduce ACE, a consent-embedded searchable encryptio...
In this paper, we design and present a novel model called SePEnTra to en...
We present two attacks on two different versions of physical layer
crypt...
Network Function Virtualisation (NFV) advances the development of compos...
Outlier detection is widely used in practice to track the anomaly on
inc...
In this paper, we develop an orthogonal precoding scheme for integer-for...
Neural network decoding algorithms are recently introduced by Nachmani e...