Results 191 to 200 of about 94,493 (210)
Some of the next articles are maybe not open access.
The security of practical quantum key distribution
Reviews of Modern Physics, 2009Valerio Scarani +2 more
exaly
Blockcipher-Based MACs: Beyond the Birthday Bound Without Message Length
International Conference on the Theory and Application of Cryptology and Information Security, 2017Yusuke Naito
semanticscholar +1 more source
Security Services Using Blockchains: A State of the Art Survey
IEEE Communications Surveys and Tutorials, 2019Tara Salman +2 more
exaly
Tweakable Block Ciphers Secure Beyond the Birthday Bound in the Ideal Cipher Model
IACR Cryptology ePrint Archive, 2018Byeonghak Lee, Jooyoung Lee
semanticscholar +1 more source
Cyber Security and Privacy Issues in Smart Grids
IEEE Communications Surveys and Tutorials, 2012Yang Xiao, Tieshan Li, Wei Liang
exaly
On the Security of Blockwise Secure Modes of Operation Beyond the Birthday Bound
IEEE Transactions on Information Theory, 2010Antoine Joux
semanticscholar +1 more source
Chemical Sniffing Instrumentation for Security Applications
Chemical Reviews, 2016Stamatios Giannoukos +2 more
exaly
On rate-1 and beyond-the-birthday bound secure online ciphers using tweakable block ciphers
Cryptography and Communications, 2018Ashwin Jha, M. Nandi
semanticscholar +1 more source
A Survey of Security in Software Defined Networks
IEEE Communications Surveys and Tutorials, 2016Sandra Scott-Hayward
exaly
SoK: A Comprehensive Reexamination of Phishing Research From the Security Perspective
IEEE Communications Surveys and Tutorials, 2020Avisha Das, Shahryar Baki, Rakesh Verma
exaly

