Suggested Topics within your search.
Suggested Topics within your search.
Cryptography
55
Network security
21
Internet of things
17
Computer security
15
Public key cryptography
13
Authentication
12
History of engineering and technology
12
TK Electrical engineering. Electronics Nuclear engineering
11
Computer networking and communications
10
QA75 Electronic computers. Computer science
10
Quantum cryptography
10
Security
10
Technology: general issues
9
Computer science
8
Security of data
8
Block-chain
7
Blockchain
7
Digital storage
7
security
7
Coding theory & cryptology
6
Information management
6
Information retrieval
6
blockchain
6
Artificial intelligence
5
Data privacy
5
Efficiency
5
Encryption
5
Network hardware
5
Quantum optics
5
Software Engineering
5
-
5661by Xianghong Hu, Xin Zheng, Shengshi Zhang, Weijun Li, Shuting Cai, Xiaoming Xiong“...Elliptic curve cryptography (ECC) is widely used in practical applications because ECC has far...”
Published 2019-04-01
Get full text
Article -
5662by Téllez Isaac, Jesús Augusto“... symmetric and non-traditional asymmetric cryptography), which have low computational power requirements...”
Published 2012
Get full text
Doctoral Thesis -
5663by Tierney, Matthew Ryan“... of public key cryptography.</p><p> In the third part of this thesis, we propose a new system, Compass...”
Published 2014
Get full text
-
5664“... cryptography algorithm. Software design method using waterfall model, database design using entity relationship...”
Get full text
Article -
5665by Dufåker, Daniel“... quantum cryptography. In the fourth paper we relate the emission pattern of the doubly positively charged...”
Published 2013
Get full text
Get full text
Doctoral Thesis -
5666by Würflinger, Lars Erik“..., such as secure cryptography and randomness generation. The identification of entanglement as a resource...”
Published 2013
Get full text
Doctoral Thesis -
5667by Dudley, Angela.“... fields which carry OAM have found applications ranging from optical tweezing to quantum cryptography. Due...”
Published 2013
Get full text
-
5668by Gaspar, Lubos“... and protocols. In the first part of the manuscript, we introduce the bases of applied cryptography...”
Published 2012
Get full text
Get full text
-
5669“... implementation of polarization-encoded schemes in quantum cryptography. The temperature stability of single...”
Get full text
Others -
5670by Andre Henrique Mayer, Vinicius Facco Rodrigues, Cristiano Andre da Costa, Rodrigo da Rosa Righi, Alex Roehrs, Rodolfo Stoffel Antunes“... of cryptography. Furthermore, the addition of Fog computing mechanisms helps to achieve real-time data processing...”
Published 2021-01-01
Get full text
Article -
5671“..., self-verified, mobile authentication scheme based on elliptic curve cryptography, which provides both...”
Get full text
Others -
5672“... in visual cryptography by taking into account the distribution of black pixels when sharing a pixel’s block...”
Get full text
Others -
5673“... cryptography and key distribution center (KDC) are not desirable to use in sensor networks. Instead, symmetric...”
Get full text
Others -
5674by Τσεκές, Χρήστος“... drawn from private and public key cryptography. We also study the functionality of hash functions...”
Published 2015
Get full text
-
5675“... in literature of cryptography. However, almost all of these are not “provable secure”. Frequently, soon after...”
Get full text
Others -
5676“... these requirements. In recent years, a new coming approach, elliptic curve cryptography (ECC), has been adopted...”
Get full text
Others -
5677“... cryptography approach is fast in decoding but is often needs larger storage space due to pixel expansion...”
Get full text
Others -
5678“..., in part, are mutually conflicted -- a standard IP security protocol with cryptography protection...”
Get full text
Others -
5679by Maia Filho, Angevaldo Menezes“..., becoming the key to the development of new technologies, such as cryptography, teleportation and quantum...”
Published 2018
Get full text
-
5680by Louwrens, Cecil Petrus“..., Secure Tokens, GSS-API and Public key Cryptography. Chapter 4 discusses the Open Software Foundation...”
Published 2012
Get full text