Showing 5,721 - 5,740 results of 5,910 for search '"cryptography"', query time: 0.97s Refine Results
  1. 5721
    by Rocha, Carlos Raphael
    Published 2009
    ... Cryptography) motivated the students for the learning of the very first principles of QM. The interest...
    Get full text
    Others
  2. 5722
    by Julis, Guenaëlle de
    Published 2014
    ...En cryptographie, l'utilisation de nombres aléatoires est fréquente (graine, token, ...) et une...
    Get full text
  3. 5723
    ... princípios fundamentais da mecânica quântica. === Nowadays, cryptography and authentication play a central...
    Get full text
  4. 5724
    by Borges, Karen Selbach
    Published 2013
    ... for data protection as, for example, use of cryptography, digital signatures, user identification, etc...
    Get full text
  5. 5725
    by Rocha, Carlos Raphael
    Published 2009
    ... Cryptography) motivated the students for the learning of the very first principles of QM. The interest...
    Get full text
    Others
  6. 5726
    by Arruda, Tiago Vanderlei de
    Published 2016
    ... applications in such devices. Elliptic curve cryptography (ECC) can be used in these applications, to ensure...
    Get full text
    Others
  7. 5727
    ... teleportation, quantum cryptography, dense coding, and quantum error correction. Although quantum information...
    Get full text
    Others
  8. 5728
    ....) always listing this entanglement with the constant evolution of cryptography and its constant search...
    Get full text
  9. 5729
    by Borges de Oliveira, Fábio
    Published 2015
    ... important than efficiency, PPPs should enforce the security of customers’ privacy by means of cryptography...
    Get full text
    Get full text
    Others
  10. 5730
    by El Bansarkhani, Rachid
    Published 2015
    ... computers are built. Lattice-based cryptography emerged as a powerful candidate attracting lots of attention...
    Get full text
    Get full text
    Others
  11. 5731
    by Hsieh, Chung Yun, 謝忠耘
    Published 2016
    ... phenomena, but also admitting many applications in quantum cryptography, communication complexity, and many...
    Get full text
    Others
  12. 5732
    by Xu, Zhiheng
    Published 2019
    ... theory and cryptography to develop secure mechanisms for different layers. For control systems, we use a...
    Get full text
  13. 5733
    by Fábio Sousa de Sant\'Ana
    Published 2016
    ... cryptography, using the AES (Advanced Encription Standards) algorithm ; 2) transfer of encrypted medical images...
    Get full text
  14. 5734
    by Mezzari, Rafael
    Published 2015
    ... cryptography methods. But visibly encrypted information arouses suspicions and curiosity. Due to this fact...
    Get full text
    Others
  15. 5735
    by Rocha, Carlos Raphael
    Published 2009
    ... Cryptography) motivated the students for the learning of the very first principles of QM. The interest...
    Get full text
    Others
  16. 5736
    by Fernando Teubl Ferreira
    Published 2007
    ... group of users, among many others. The protection of group contents is achieved by cryptography...
    Get full text
  17. 5737
    by Teresinha das Graças Coletta
    Published 2007
    ..., cryptography and version control. Based on the gotten results, concludes that there is a limited availability...
    Get full text
  18. 5738
    by Harold Alberto Rojas Páez
    Published 2017
    ..., such as quantum cryptography and teleportation. It is a basic piece for quantum information processing, aiming...
    Get full text
  19. 5739
    by Freitas, Rodrigo da Silva
    Published 2016
    ... are demonstrably employed, such as in cryptography. To that end, some parameters presumably related...
    Get full text
    Others
  20. 5740
    by Nogueira, Hendri
    Published 2014
    ... of different cryptographic mechanisms, such as Identity-Based Cryptography (IBC) and zero-knowledge...
    Get full text
    Others