Results 161 to 170 of about 75,969 (261)

Integration of OWL Password-Authenticated Key Exchange Protocol to Enhance IoT Application Protocols. [PDF]

open access: yesSensors (Basel)
Julio YR   +4 more
europepmc   +1 more source

Using Cryptographic Hash Functions for Discretionary Access Control in Object-Oriented Databases [PDF]

open access: green, 1997
Ahmad Baraani-Dastjerdi   +3 more
openalex   +1 more source

Radical 2-Isogenies and Cryptographic Hash Functions in Dimensions 1, 2 and 3

open access: bronze
Sabrina Kunzweiler   +7 more
openalex   +2 more sources

STITCH-256: A Dedicated Cryptographic Hash Function

open access: yesJournal of Applied Sciences, 2012
Ramlan Mahmod   +4 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy