Results 261 to 270 of about 1,801,560 (284)
Some of the next articles are maybe not open access.

Improve the Onion Routing Performance and Security with Cryptographic Algorithms

International Journal on Recent and Innovation Trends in Computing and Communication, 2023
exaly  

Reasoning about belief in cryptographic protocols

Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy, 1990
L. Gong, R. Needham, Raphael Yahalom
semanticscholar   +1 more source

Cryptographic MPC Protocols

2015
Ivan Damgård   +2 more
openaire   +2 more sources

How to Evaluate the Security of Real-Life Cryptographic Protocols? - The Cases of ISO/IEC 29128 and CRYPTREC

Financial Cryptography Workshops, 2010
Shin'ichiro Matsuo   +3 more
semanticscholar   +1 more source

A comprehensive survey of modern symmetric cryptographic solutions for resource constrained environments

Journal of Network and Computer Applications, 2015
Jia Hao Kong, Li-minn Ang
exaly  

A New Hard Problem over Non-commutative Finite Groups for Cryptographic Protocols

Mathematical Methods, Models, and Architectures for Network Security Systems, 2010
D. Moldovyan, N. Moldovyan
semanticscholar   +1 more source

Physically unclonable cryptographic primitives using self-assembled carbon nanotubes

Nature Nanotechnology, 2016
Hongsik Park   +2 more
exaly  

Cost-effective secure E-health cloud system using identity based cryptographic techniques

Future Generation Computer Systems, 2017
Xu An Wang, Fatos Xhafa
exaly  

Home - About - Disclaimer - Privacy