Erratum: Decoy-state protocol for quantum cryptography with four different intensities of coherent light [Phys. Rev. A72, 012322 (2005)] [PDF]
Xiang‐Bin Wang
openalex +1 more source
HERMEES: A Holistic Evaluation and Ranking Model for Energy-Efficient Systems Applied to Selecting Optimal Lightweight Cryptographic and Topology Construction Protocols in Wireless Sensor Networks. [PDF]
Prvulovic P+3 more
europepmc +1 more source
A S/KEY Based Secure Authentication Protocol Using Public Key Cryptography
Ilsun You, Kyung-San Cho
openalex +2 more sources
A SECURE CHANNEL PROTOCOL FOR MULTI-APPLICATION SMART CARDS BASED ON PUBLIC KEY CRYPTOGRAPHY [PDF]
Konstantinos Markantonakis, Keith Mayes
openalex +1 more source
Decentralized trust framework for smart cities: a blockchain-enabled cybersecurity and data integrity model. [PDF]
Islam R+7 more
europepmc +1 more source
A Hybrid Authentication Protocol Using Quantum Entanglement and Symmetric Cryptography
David R. Kuhn
openalex +2 more sources
Bio-inspired cryptography based on proteinoid assemblies. [PDF]
Mougkogiannis P, Ghadafi E, Adamatzky A.
europepmc +1 more source
Some Attacks On Quantum-based Cryptographic Protocols
Hoi‐Kwong Lo, Tsz-Mei Ko
openalex +2 more sources