Results 271 to 280 of about 1,801,560 (284)
Some of the next articles are maybe not open access.

Bio-cryptographic protocols with bipartite biotokens

2008 Biometrics Symposium, 2008
W. Scheirer, T. Boult
semanticscholar   +1 more source

Charm: a framework for rapidly prototyping cryptosystems

Journal of Cryptographic Engineering, 2013
Matthew Green
exaly  

Towards Understanding Pure Publish/Subscribe Cryptographic Protocols

Security Protocols Workshop, 2008
P. Nikander, G. Marias
semanticscholar   +1 more source

Secure cryptographic functions via virtualization‐based outsourced computing

Concurrency Computation Practice and Experience, 2016
Hai Jin, Weiqi Dai, Weizhong Qiang
exaly  

Modelling Attacker's Knowledge for Cascade Cryptographic Protocols

International Conference on Abstract State Machines, Alloy, B, TLA, VDM, and Z, 2008
Nazim Benaïssa
semanticscholar   +1 more source

Trust Enhanced Cryptographic Role-Based Access Control for Secure Cloud Data Storage

IEEE Transactions on Information Forensics and Security, 2015
Michael Hitchens, Vijay Varadharajan
exaly  

Home - About - Disclaimer - Privacy