Results 191 to 200 of about 6,594 (201)
Some of the next articles are maybe not open access.
Cost-effective secure E-health cloud system using identity based cryptographic techniques
Future Generation Computer Systems, 2017Xu An Wang, Fatos Xhafa
exaly
Charm: a framework for rapidly prototyping cryptosystems
Journal of Cryptographic Engineering, 2013Matthew Green
exaly
A Survey of Public-Key Cryptographic Primitives in Wireless Sensor Networks
IEEE Communications Surveys and Tutorials, 2016exaly
Secure cryptographic functions via virtualizationābased outsourced computing
Concurrency Computation Practice and Experience, 2016Hai Jin, Weiqi Dai, Weizhong Qiang
exaly
Trust Enhanced Cryptographic Role-Based Access Control for Secure Cloud Data Storage
IEEE Transactions on Information Forensics and Security, 2015Michael Hitchens, Vijay Varadharajan
exaly
A Novel Design of Cryptographic SP-Network Based on Gold Sequences and Chaotic Logistic Tent System
IEEE Access, 2019Muhammad Fahad Khan, Khalid Saleem
exaly
Comparative survey of high-performance cryptographic algorithm implementations on FPGAs
IEE Proceedings - Information Security, 2005exaly
On the importance of cryptographic agility for industrial automation
Automatisierungstechnik, 2019exaly
Using quantum key distribution for cryptographic purposes: A survey
Theoretical Computer Science, 2014exaly