Results 191 to 200 of about 375,459 (282)

Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage

open access: yesIEEE Transactions on Information Forensics and Security, 2017
Yong Yu   +6 more
semanticscholar   +1 more source

Lossy trapdoor functions and their applications

open access: yesSIAM journal on computing (Print), 2008
Chris Peikert, Brent Waters
semanticscholar   +1 more source

In-line rate encrypted links using pre-shared post-quantum keys and DPUs. [PDF]

open access: yesSci Rep
Cano Aguilera A   +5 more
europepmc   +1 more source

Securing the IoT-enabled smart healthcare system: A PUF-based resource-efficient authentication mechanism. [PDF]

open access: yesHeliyon
Alruwaili O   +5 more
europepmc   +1 more source

Authenticated Encryption using Lightweight Cryptographic Primitives for Wireless Sensor Networks

open access: gold, 2019
P Rajkamal   +3 more
openalex   +1 more source

Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions

open access: yesAnnual International Cryptology Conference, 2011
A. Boldyreva   +2 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy