Showing 5,561 - 5,580 results of 5,910 for search '"cryptography"', query time: 0.77s Refine Results
  1. 5561
    ... for image processing, audio processing, text and data processing, cryptography, network processing...
    Get full text
    Get full text
    Others
  2. 5562
    by Irazoki, Gorka
    Published 2017
    ... cryptography is compromised, as it is the main component of every security solution. In this sense...
    Get full text
    Get full text
    Others
  3. 5563
    ... dynamics which can be applied to cryptography. Dynamical properties of IAWs are examined using the direct...
    Get full text
    Article
  4. 5564
  5. 5565
    ... strategy utilizing both advanced encryption standard and elliptic curve cryptography. The security analysis...
    Get full text
    Article
  6. 5566
    by Xiao, Yunlong
    Published 2017
    ... established as important tools for a wide range of applications, such as quantum cryptography, quantum key...
    Get full text
    Get full text
    Get full text
    Doctoral Thesis
  7. 5567
    by Iranmanesh, Seyed Amir
    Published 2017
    ... and unsolicited calls. Our approach is based on the identity-based cryptography, and it also leverages the Domain...
    Get full text
    Get full text
    Others
  8. 5568
    by Hülsing, Andreas
    Published 2013
    .... This implies that as long as there exists any complexity-based cryptography, there exists a secure...
    Get full text
    Get full text
    Others
  9. 5569
    by Mazaheri, Sogol
    Published 2020
    ... tailoring the existing approaches from various areas in cryptography and other closely related disciplines...
    Get full text
    Get full text
    Others
  10. 5570
    by Tan, Heng Chuan
    Published 2017
    ... (SA-KMP) qui utilise une cryptographie symétrique pour protéger la communication, y compris...
    Get full text
  11. 5571
    by Flori, Jean-Pierre
    Published 2012
    ... the theory of (hyper)elliptic curves in a different direction. Several constructions in cryptography indeed...
    Get full text
  12. 5572
    by Abdoun, Nabil
    Published 2019
    ...Les fonctions de hachage sont des primitives les plus utiles en cryptographie. En effet, elles...
    Get full text
  13. 5573
    by Fang-Sun Lu, 呂芳森
    Published 2007
    ..., which applies the emerging ID-based cryptography for key agreement and authentication. Our MEP attempts...
    Get full text
    Others
  14. 5574
    by Fattahi, Jaouhar
    Published 2016
    ... commerce électronique, le domaine militaire, le vote électronique, etc. L’utilisation de la cryptographie...
    Get full text
    Doctoral Thesis
  15. 5575
    by Leblanc, Maxime
    Published 2016
    ... of cryptography operations at the hardware level. The process is applicable only to content which does not need...
    Get full text
    Dissertation
  16. 5576
    by Mariot, Luca
    Published 2018
    ... ses applications à la cryptographie, puisque les fonctions booléennes et les dessins combinatoires...
    Get full text
  17. 5577
    by Blandino, Rémi
    Published 2013
    ...-déterministe en cryptographie quantique. Cet amplificateur possède la propriété de pouvoir amplifier des états...
    Get full text
  18. 5578
    by Raghuraman, Shashank
    Published 2019
    ... security of such devices has been driving extensive research on lightweight cryptography, which focuses...
    Get full text
    Others
  19. 5579
    ... such as location or identity. Cryptography-based approach aids in preserving the privacy of the user. However...
    Get full text
    Article
  20. 5580
    ...Elliptic curve cryptography (ECC) is widely used in practical applications because ECC has far...
    Get full text
    Article