Results 271 to 280 of about 1,801,560 (284)
Some of the next articles are maybe not open access.
Bio-cryptographic protocols with bipartite biotokens
2008 Biometrics Symposium, 2008W. Scheirer, T. Boult
semanticscholar +1 more source
Charm: a framework for rapidly prototyping cryptosystems
Journal of Cryptographic Engineering, 2013Matthew Green
exaly
Towards Understanding Pure Publish/Subscribe Cryptographic Protocols
Security Protocols Workshop, 2008P. Nikander, G. Marias
semanticscholar +1 more source
A Survey of Public-Key Cryptographic Primitives in Wireless Sensor Networks
IEEE Communications Surveys and Tutorials, 2016exaly
Secure cryptographic functions via virtualization‐based outsourced computing
Concurrency Computation Practice and Experience, 2016Hai Jin, Weiqi Dai, Weizhong Qiang
exaly
Modelling Attacker's Knowledge for Cascade Cryptographic Protocols
International Conference on Abstract State Machines, Alloy, B, TLA, VDM, and Z, 2008Nazim Benaïssa
semanticscholar +1 more source
Trust Enhanced Cryptographic Role-Based Access Control for Secure Cloud Data Storage
IEEE Transactions on Information Forensics and Security, 2015Michael Hitchens, Vijay Varadharajan
exaly
A Novel Design of Cryptographic SP-Network Based on Gold Sequences and Chaotic Logistic Tent System
IEEE Access, 2019Muhammad Fahad Khan, Khalid Saleem
exaly
Comparative survey of high-performance cryptographic algorithm implementations on FPGAs
IEE Proceedings - Information Security, 2005exaly