Results 221 to 229 of about 42,263 (229)
Some of the next articles are maybe not open access.
Secure cryptographic functions via virtualizationābased outsourced computing
Concurrency Computation Practice and Experience, 2016Hai Jin, Weiqi Dai, Weizhong Qiang
exaly
Trust Enhanced Cryptographic Role-Based Access Control for Secure Cloud Data Storage
IEEE Transactions on Information Forensics and Security, 2015Michael Hitchens, Vijay Varadharajan
exaly
A Novel Design of Cryptographic SP-Network Based on Gold Sequences and Chaotic Logistic Tent System
IEEE Access, 2019Muhammad Fahad Khan, Khalid Saleem
exaly
Comparative survey of high-performance cryptographic algorithm implementations on FPGAs
IEE Proceedings - Information Security, 2005exaly
On the importance of cryptographic agility for industrial automation
Automatisierungstechnik, 2019exaly
Using quantum key distribution for cryptographic purposes: A survey
Theoretical Computer Science, 2014exaly
A time-bound cryptographic key assignment scheme for access control in a hierarchy
IEEE Transactions on Knowledge and Data Engineering, 2002exaly