Results 271 to 280 of about 375,459 (282)
Some of the next articles are maybe not open access.
Physically unclonable cryptographic primitives using self-assembled carbon nanotubes
Nature Nanotechnology, 2016Hongsik Park+2 more
exaly
Cost-effective secure E-health cloud system using identity based cryptographic techniques
Future Generation Computer Systems, 2017Xu An Wang, Fatos Xhafa
exaly
Secure Cloud-Based EHR System Using Attribute-Based Cryptosystem and Blockchain
Journal of medical systems, 2018Hao Wang, Yujiao Song
semanticscholar +1 more source
Charm: a framework for rapidly prototyping cryptosystems
Journal of Cryptographic Engineering, 2013Matthew Green
exaly
A Survey of Public-Key Cryptographic Primitives in Wireless Sensor Networks
IEEE Communications Surveys and Tutorials, 2016exaly
Secure cryptographic functions via virtualizationābased outsourced computing
Concurrency Computation Practice and Experience, 2016Hai Jin, Weiqi Dai, Weizhong Qiang
exaly
Trust Enhanced Cryptographic Role-Based Access Control for Secure Cloud Data Storage
IEEE Transactions on Information Forensics and Security, 2015Michael Hitchens, Vijay Varadharajan
exaly
Comparative survey of high-performance cryptographic algorithm implementations on FPGAs
IEE Proceedings - Information Security, 2005exaly
On the importance of cryptographic agility for industrial automation
Automatisierungstechnik, 2019exaly