Showing 1 - 16 results of 16 for search '"cryptography"', query time: 0.61s Refine Results
  1. 1
    by Hutchinson, Aaron
    Published 2019
    ...<p> Elliptic curves have played a large role in modern cryptography. Most notably, the Elliptic...
    Get full text
  2. 2
    by Lucas, John Patrick
    Published 2017
    ... (cFS). A cFS cryptography library, named Crypto, was developed to implement the SDLS-EP procedures...
    Get full text
  3. 3
    by Enos, Graham
    Published 2013
    ... explore some applications of elliptic curve and pairing-based cryptography wherein the added security...
    Get full text
  4. 4
    by Ghosh, Debeshi D.
    Published 2017
    ... an embedded image (watermark) using the XOR method of symmetric key cryptography. Encryption is then followed...
    Get full text
  5. 5
    by Al Khulaif, Husain H.
    Published 2014
    ... decisions taken in the design of these cryptographic primitives through various ages of cryptography...
    Get full text
  6. 6
    by Gudapati, Supriya
    Published 2015
    ... different approach called hybrid cryptography in our proposed scheme. Enhanced Adaptive Acknowledgment...
    Get full text
  7. 7
    by Tambasco, Michael J.
    Published 2015
    ...., biometric equipment, quantum resistant cryptography, and the abstract realm, i.e., legal considerations...
    Get full text
  8. 8
    by Suwannarath, Songluk
    Published 2016
    ... knowledge protocol and a session key cryptography into the formation phase, and modify packets that were...
    Get full text
  9. 9
    by Wadhwa, Preeti H.
    Published 2015
    ... of the gradient based routing and cryptography in a network. For implementation of the proposed algorithm...
    Get full text
  10. 10
    by Gero, Kimberly A.
    Published 2015
    ...>. This topic is of great interest and importance to cryptography. Cryptographic protocol analysis...
    Get full text
  11. 11
    by Batson, Scott Christopher
    Published 2015
    ... number field. Many recent developments in lattice-based cryptography are centered around the use of ideal...
    Get full text
  12. 12
    by Castro, Jose M
    Published 2006
    ... in spectral phase encoding/decoding and optical cryptography are presented....
    Get full text
  13. 13
    by Muralidharan, Sreraman
    Published 2018
    ...<p> Despite the tremendous progress of quantum cryptography, efficient quantum communication over...
    Get full text
  14. 14
    by McCusker, James P.
    Published 2015
    ... of cryptography, computer security, semantic web services, semantic publishing, library science, and provenance...
    Get full text
  15. 15
    by Tierney, Matthew Ryan
    Published 2014
    ... of public key cryptography.</p><p> In the third part of this thesis, we propose a new system, Compass...
    Get full text
  16. 16
    by Xu, Zhiheng
    Published 2019
    ... theory and cryptography to develop secure mechanisms for different layers. For control systems, we use a...
    Get full text