Showing 5,681 - 5,700 results of 5,991 for search '"cryptography"', query time: 0.70s Refine Results
  1. 5681
    by Namal, S. (Suneth)
    Published 2014
    ... (HIP) based identity attributes and Elliptic Curve Cryptography (ECC) based session key generation...
    Get full text
    Get full text
    Doctoral Thesis
  2. 5682
    by Gadekar, Ameet
    Published 2018
    ... bounds fork-LPN problem is an open challenge and many algorithms in cryptography have been developed...
    Get full text
    Get full text
  3. 5683
    by Chi-Kai Lin, 林祺凱
    Published 2003
    ... issue and more and more experts and scholars focus on the issues and research of cryptography...
    Get full text
    Others
  4. 5684
    by Tunaru, Iulia
    Published 2015
    .... The main security mechanism for confidentiality in such networks is symmetric cryptography, which requires...
    Get full text
  5. 5685
    by Weinmann, Ralf-Philipp
    Published 2009
    ... and Cryptography (SCC 2008)"....
    Get full text
    Get full text
    Others
  6. 5686
    ...: The use of codes and lattices in Information Theory and in the so-called "Post-quantum Cryptography" has...
    Get full text
    Get full text
    Others
  7. 5687
    by Raheem, Ali Hussein
    Published 2017
    ... using ID/Based cryptography method. The second security protocol was implemented to address...
    Get full text
  8. 5688
  9. 5689
    by Rothblum, Guy N
    Published 2010
    ... questions in cryptography and complexity theory. The focus of this thesis is verifying the correctness...
    Get full text
    Others
  10. 5690
    by Tauman Kalai, Yael
    Published 2006
    ... references (p. 115-119). === The goal of cryptography is to construct *secure* and *efficient* protocols...
    Get full text
    Others
  11. 5691
    by Chen, Cong
    Published 2018
    ...With the emerging computing technologies and applications in the past decades, cryptography...
    Get full text
    Get full text
    Others
  12. 5692
    Published 2001
    ... Cryptosystem --- p.65 === Chapter 4.1 --- Introduction to Cryptography --- p.66 === Chapter 4.1.1...
    Get full text
    Get full text
    Others
  13. 5693
    by Bonnoron, Guillaume
    Published 2018
    ... nouveau type de cryptographie. Son côté révolutionnaire tient au fait qu'il permet d'effectuer des...
    Get full text
  14. 5694
    ..., such as cryptography. Its design principle was from the ripple carry addition (RCA) algorithm, which is the most widely...
    Get full text
    Article
  15. 5695
    by Fuguet Tortolero, César
    Published 2015
    ... cryptographie, la simulation, ou le traitement du signal a fait évoluer la structure interne des processeurs...
    Get full text
  16. 5696
    by Sulieman, Nabeel Ibrahim
    Published 2019
    ... such as Secure Multicasting using Secret (Shared) Key Cryptography....
    Get full text
    Get full text
    Others
  17. 5697
    by Cho,Mingyi-Yi, 卓明怡
    Published 2017
    ... are information security policy, compliance, information security organization and cryptography, It is indicating...
    Get full text
    Others
  18. 5698
    by Rashwan, Haitham
    Published 2011
    ... combined system for error protection and cryptography. Our results suggest that the McEliece key size has...
    Get full text
  19. 5699
    ... the chapter we make a short reference in smart card’s cryptography. In the fourth chapter we make a more...
    Get full text
  20. 5700
    ... employing Elliptic Curve Cryptography, in which, by providing one-to-many facility, only one authentication...
    Get full text
    Others