Showing 5,661 - 5,680 results of 5,991 for search '"cryptography"', query time: 1.15s Refine Results
  1. 5661
    ...Elliptic curve cryptography (ECC) is widely used in practical applications because ECC has far...
    Get full text
    Article
  2. 5662
    by Téllez Isaac, Jesús Augusto
    Published 2012
    ... symmetric and non-traditional asymmetric cryptography), which have low computational power requirements...
    Get full text
    Doctoral Thesis
  3. 5663
    by Tierney, Matthew Ryan
    Published 2014
    ... of public key cryptography.</p><p> In the third part of this thesis, we propose a new system, Compass...
    Get full text
  4. 5664
    by Agus Tedyyana, Danuri Danuri
    Published 2017-11-01
    ... cryptography algorithm. Software design method using waterfall model, database design using entity relationship...
    Get full text
    Article
  5. 5665
    by Dufåker, Daniel
    Published 2013
    ... quantum cryptography. In the fourth paper we relate the emission pattern of the doubly positively charged...
    Get full text
    Get full text
    Doctoral Thesis
  6. 5666
    by Würflinger, Lars Erik
    Published 2013
    ..., such as secure cryptography and randomness generation. The identification of entanglement as a resource...
    Get full text
    Doctoral Thesis
  7. 5667
    by Dudley, Angela.
    Published 2013
    ... fields which carry OAM have found applications ranging from optical tweezing to quantum cryptography. Due...
    Get full text
  8. 5668
    by Gaspar, Lubos
    Published 2012
    ... and protocols. In the first part of the manuscript, we introduce the bases of applied cryptography...
    Get full text
    Get full text
  9. 5669
    by Wen-yen Chen, 陳文彥
    Published 2007
    ... implementation of polarization-encoded schemes in quantum cryptography. The temperature stability of single...
    Get full text
    Others
  10. 5670
    ... of cryptography. Furthermore, the addition of Fog computing mechanisms helps to achieve real-time data processing...
    Get full text
    Article
  11. 5671
    by Tsai, Hao-Chuan, 蔡濠全
    Published 2010
    ..., self-verified, mobile authentication scheme based on elliptic curve cryptography, which provides both...
    Get full text
    Others
  12. 5672
    ... in visual cryptography by taking into account the distribution of black pixels when sharing a pixel’s block...
    Get full text
    Others
  13. 5673
    by Yen-Hua Liao, 廖燕華
    Published 2011
    ... cryptography and key distribution center (KDC) are not desirable to use in sensor networks. Instead, symmetric...
    Get full text
    Others
  14. 5674
    by Τσεκές, Χρήστος
    Published 2015
    ... drawn from private and public key cryptography. We also study the functionality of hash functions...
    Get full text
  15. 5675
    by Fuw-Yi Yang, 楊伏夷
    Published 2004
    ... in literature of cryptography. However, almost all of these are not “provable secure”. Frequently, soon after...
    Get full text
    Others
  16. 5676
    by Lee, Jen-Wei, 李人偉
    Published 2013
    ... these requirements. In recent years, a new coming approach, elliptic curve cryptography (ECC), has been adopted...
    Get full text
    Others
  17. 5677
    by Chao, Kun-Yuan, 趙崑源
    Published 2009
    ... cryptography approach is fast in decoding but is often needs larger storage space due to pixel expansion...
    Get full text
    Others
  18. 5678
    by TeFa Liao, 廖德發
    Published 2005
    ..., in part, are mutually conflicted -- a standard IP security protocol with cryptography protection...
    Get full text
    Others
  19. 5679
    by Maia Filho, Angevaldo Menezes
    Published 2018
    ..., becoming the key to the development of new technologies, such as cryptography, teleportation and quantum...
    Get full text
  20. 5680
    by Louwrens, Cecil Petrus
    Published 2012
    ..., Secure Tokens, GSS-API and Public key Cryptography. Chapter 4 discusses the Open Software Foundation...
    Get full text