Results 251 to 260 of about 42,947 (261)
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Practical device-independent quantum cryptography via entropy accumulation
Nature Communications, 2018Rotem Arnon-Friedman +2 more
exaly
Cryptography: Malicious Cryptography – Exposing Cryptovirology
Computer Law & Security Report, 2004Moti Yung, Adam L. Young
openaire +2 more sources
DNA origami cryptography for secure communication
Nature Communications, 2019Yinan Zhang, Fei Wang, Jie Chao
exaly
A Survey of Applications of Identity-Based Cryptography in Mobile Ad-Hoc Networks
IEEE Communications Surveys and Tutorials, 2012exaly

