Suggested Topics within your search.
Suggested Topics within your search.
Cryptography
55
Internet of things
17
Network security
14
Public key cryptography
13
Authentication
12
TK Electrical engineering. Electronics Nuclear engineering
11
QA75 Electronic computers. Computer science
10
Quantum cryptography
10
Security
10
Security of data
8
Block-chain
7
Blockchain
7
Digital storage
7
security
7
Information management
6
blockchain
6
Computer security
5
Data privacy
5
Efficiency
5
Encryption
5
Quantum optics
5
Trusted computing
5
computer security
5
Cloud computing
4
Coding theory & cryptology
4
Cyber security
4
Cybersecurity
4
Field programmable gate arrays (FPGA)
4
Hardware architecture
4
Hash functions
4
-
61
-
62
-
63
-
64by Erven, ChristopherSubjects: “...Experimental Quantum Cryptography...”
Published 2012
Get full text
-
65
-
66
-
67by Basuchowdhuri, Partha“... Journal in 2003 in their annual edition. The growth in quantum cryptography since the beginning...”
Published 2008
Get full text
Others -
68
-
69by Erven, ChristopherSubjects: “...Experimental Quantum Cryptography...”
Published 2012
Get full text
-
70
-
71
-
72
-
73
-
74by Robertas Damaševičius, Rytis Maskeliūnas, Egidijus Kazanavičius, Marcin Woźniak“... user, in biometric frameworks this is different. Joining cryptography techniques with biometrics can...”
Published 2018-01-01
Get full text
Article -
75
-
76by Weir, J. P.“... and shortcomings within the area of visual cryptography. Visual cryptography provides a very powerful means...”
Published 2012
Get full text
-
77
-
78
-
79
-
80by 何明俞“... cryptography by user-defined key from external inputting. Except users who own the device within embedded key...”
Published 2004
Get full text
Others