Results 111 to 120 of about 6,594 (201)
Neural network-based symmetric encryption algorithm with encrypted traffic protocol identification. [PDF]
Hao J, Jin M, Li Y, Yang Y.
europepmc +1 more source
Erratum: Decoy-state protocol for quantum cryptography with four different intensities of coherent light [Phys. Rev. A72, 012322 (2005)] [PDF]
Xiang‐Bin Wang
openalex +1 more source
Integration of OWL Password-Authenticated Key Exchange Protocol to Enhance IoT Application Protocols. [PDF]
Julio YR+4 more
europepmc +1 more source
Some Attacks On Quantum-based Cryptographic Protocols
Hoi‐Kwong Lo, Tsz-Mei Ko
openalex +2 more sources
A SECURE CHANNEL PROTOCOL FOR MULTI-APPLICATION SMART CARDS BASED ON PUBLIC KEY CRYPTOGRAPHY [PDF]
Konstantinos Markantonakis, Keith Mayes
openalex +1 more source
Bio-inspired cryptography based on proteinoid assemblies. [PDF]
Mougkogiannis P, Ghadafi E, Adamatzky A.
europepmc +1 more source
A S/KEY Based Secure Authentication Protocol Using Public Key Cryptography
Ilsun You, Kyung-San Cho
openalex +2 more sources
A Hybrid Authentication Protocol Using Quantum Entanglement and Symmetric Cryptography
David R. Kuhn
openalex +2 more sources