Suggested Topics within your search.
Suggested Topics within your search.
Cryptography
55
Network security
21
Internet of things
17
Computer security
15
Public key cryptography
13
Authentication
12
History of engineering and technology
12
TK Electrical engineering. Electronics Nuclear engineering
11
Computer networking and communications
10
QA75 Electronic computers. Computer science
10
Quantum cryptography
10
Security
10
Technology: general issues
9
Computer science
8
Security of data
8
Block-chain
7
Blockchain
7
Digital storage
7
security
7
Coding theory & cryptology
6
Information management
6
Information retrieval
6
blockchain
6
Artificial intelligence
5
Data privacy
5
Efficiency
5
Encryption
5
Network hardware
5
Quantum optics
5
Software Engineering
5
-
5681by Namal, S. (Suneth)“... (HIP) based identity attributes and Elliptic Curve Cryptography (ECC) based session key generation...”
Published 2014
Get full text
Get full text
Doctoral Thesis -
5682by Gadekar, Ameet“... bounds fork-LPN problem is an open challenge and many algorithms in cryptography have been developed...”
Published 2018
Get full text
Get full text
-
5683“... issue and more and more experts and scholars focus on the issues and research of cryptography...”
Get full text
Others -
5684by Tunaru, Iulia“.... The main security mechanism for confidentiality in such networks is symmetric cryptography, which requires...”
Published 2015
Get full text
-
5685by Weinmann, Ralf-Philipp“... and Cryptography (SCC 2008)"....”
Published 2009
Get full text
Get full text
Others -
5686by Jorge, Grasiele Cristiane, 1983-“...: The use of codes and lattices in Information Theory and in the so-called "Post-quantum Cryptography" has...”
Published 2012
Get full text
Get full text
Others -
5687by Raheem, Ali Hussein“... using ID/Based cryptography method. The second security protocol was implemented to address...”
Published 2017
Get full text
-
5688by FERNÁNDEZ DÍAZ, Jorge Lenin“... and quantum cryptography. This work studies a very efficient...”
Published 2017
Get full text
-
5689by Rothblum, Guy N“... questions in cryptography and complexity theory. The focus of this thesis is verifying the correctness...”
Published 2010
Get full text
Others -
5690by Tauman Kalai, Yael“... references (p. 115-119). === The goal of cryptography is to construct *secure* and *efficient* protocols...”
Published 2006
Get full text
Others -
5691by Chen, Cong“...With the emerging computing technologies and applications in the past decades, cryptography...”
Published 2018
Get full text
Get full text
Others -
5692Published 2001“... Cryptosystem --- p.65 === Chapter 4.1 --- Introduction to Cryptography --- p.66 === Chapter 4.1.1...”
Get full text
Get full text
Others -
5693by Bonnoron, Guillaume“... nouveau type de cryptographie. Son côté révolutionnaire tient au fait qu'il permet d'effectuer des...”
Published 2018
Get full text
-
5694“..., such as cryptography. Its design principle was from the ripple carry addition (RCA) algorithm, which is the most widely...”
Get full text
Article -
5695by Fuguet Tortolero, César“... cryptographie, la simulation, ou le traitement du signal a fait évoluer la structure interne des processeurs...”
Published 2015
Get full text
-
5696by Sulieman, Nabeel Ibrahim“... such as Secure Multicasting using Secret (Shared) Key Cryptography....”
Published 2019
Get full text
Get full text
Others -
5697“... are information security policy, compliance, information security organization and cryptography, It is indicating...”
Get full text
Others -
5698by Rashwan, Haitham“... combined system for error protection and cryptography. Our results suggest that the McEliece key size has...”
Published 2011
Get full text
-
5699by Αντωνόπουλος, Νικόλαος“... the chapter we make a short reference in smart card’s cryptography. In the fourth chapter we make a more...”
Published 2009
Get full text
-
5700by Leu, Muh-Chyi, 呂沐錡“... employing Elliptic Curve Cryptography, in which, by providing one-to-many facility, only one authentication...”
Get full text
Others