Results 141 to 150 of about 388,006 (269)
Privacy-Preserving ECC-Based AKA for Resource-Constrained IoT Sensor Networks with Forgotten Password Reset. [PDF]
Yu Y, Wei K, Qi K, Wu W.
europepmc +1 more source
A. Juels, M. Wattenberg
semanticscholar +1 more source
Cryptographic protection of RGB images using SPN over Eisenstein integer ring modulo Eisenstein prime. [PDF]
Sajjad M +4 more
europepmc +1 more source
Message-Locked Encryption and Secure Deduplication
M. Bellare +2 more
semanticscholar +1 more source
Constructing formal models of cryptographic protocols from Alice&Bob style specifications via LLM. [PDF]
Li Q, Han J, Yuan L, Li X, Wang X.
europepmc +1 more source
A Lightweight Key Agreement Protocol for V2X Communications Based on Kyber and Saber. [PDF]
Dai Y, Wang Q, Song X, Wang S.
europepmc +1 more source
Empowering IoV Security: A Novel Secure Cryptographic Algorithm (OpCKEE) for Network Protection in Connected Vehicles. [PDF]
Ebadinezhad S, Nlend Bayemi PF.
europepmc +1 more source
Implementing TLS with Verified Cryptographic Security
K. Bhargavan +4 more
semanticscholar +1 more source

