Results 191 to 200 of about 94,493 (210)
Some of the next articles are maybe not open access.

The security of practical quantum key distribution

Reviews of Modern Physics, 2009
Valerio Scarani   +2 more
exaly  

Blockcipher-Based MACs: Beyond the Birthday Bound Without Message Length

International Conference on the Theory and Application of Cryptology and Information Security, 2017
Yusuke Naito
semanticscholar   +1 more source

Security Services Using Blockchains: A State of the Art Survey

IEEE Communications Surveys and Tutorials, 2019
Tara Salman   +2 more
exaly  

Tweakable Block Ciphers Secure Beyond the Birthday Bound in the Ideal Cipher Model

IACR Cryptology ePrint Archive, 2018
Byeonghak Lee, Jooyoung Lee
semanticscholar   +1 more source

Cyber Security and Privacy Issues in Smart Grids

IEEE Communications Surveys and Tutorials, 2012
Yang Xiao, Tieshan Li, Wei Liang
exaly  

Chemical Sniffing Instrumentation for Security Applications

Chemical Reviews, 2016
Stamatios Giannoukos   +2 more
exaly  

A Survey of Security in Software Defined Networks

IEEE Communications Surveys and Tutorials, 2016
Sandra Scott-Hayward
exaly  

SoK: A Comprehensive Reexamination of Phishing Research From the Security Perspective

IEEE Communications Surveys and Tutorials, 2020
Avisha Das, Shahryar Baki, Rakesh Verma
exaly  

Home - About - Disclaimer - Privacy