Results 221 to 230 of about 120,057 (278)
Forensics System for Internet of Vehicles Based on Post-Quantum Blockchain. [PDF]
Zhang Z, Cao Z, Wang Y.
europepmc +1 more source
Quantum resistant blockchain and deep learning revolutionize secure communications for autonomous vehicles. [PDF]
Alluhaibi R.
europepmc +1 more source
Cellular automata based key distribution for lightweight hybrid image encryption with elliptic curve cryptography. [PDF]
Yogi B, Khan AK, Roy S.
europepmc +1 more source
The Mathematical Foundation of Post-Quantum Cryptography. [PDF]
Zong C.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
2010
Prior to version 4.0, the .NET Framework incorporated two complementary security models that addressed user and code security: role-based security (RBS) and code access security (CAS). With version 4.0, CAS has been deprecated. The previous edition of this book included a number of CAS recipes (11-1 through to 11-7), and we have included them in this ...
Allen Jones, Adam Freeman
openaire +1 more source
Prior to version 4.0, the .NET Framework incorporated two complementary security models that addressed user and code security: role-based security (RBS) and code access security (CAS). With version 4.0, CAS has been deprecated. The previous edition of this book included a number of CAS recipes (11-1 through to 11-7), and we have included them in this ...
Allen Jones, Adam Freeman
openaire +1 more source
Cryptography and Middleware Security
2001Middleware gives applications an abstract view of the underlying technology. Access control policies define the authorisations of principals. When no suitable representation of principals is available on the middleware layer, policies resort to using verifiable identifiers of underlying cryptographic mechanisms. However, this approach collides with the
Ulrich Lang +2 more
openaire +1 more source
Security Services and Cryptography
1999The origin of the word cryptology lies in ancient Greek. The word cryptology is made up of two components: kryptos, which means hidden and logos, which means word. Cryptology is as old as writing itself, and has been used for thousands of years to safeguard military and diplomatic communications. For example, the famous Roman emperor Julius Caesar used
Paul Ashley, Mark Vandenwauver
openaire +1 more source
2003
Writing secure code is hard. Even in traditional client-server applications, it’s difficult to defend against the vast array of possible threats and attacks. Security considerations stretch across every area of programming, from design to deployment, and include everything from hiding sensitive information to restricting the abilities of different ...
openaire +1 more source
Writing secure code is hard. Even in traditional client-server applications, it’s difficult to defend against the vast array of possible threats and attacks. Security considerations stretch across every area of programming, from design to deployment, and include everything from hiding sensitive information to restricting the abilities of different ...
openaire +1 more source
2010
In this chapter, we saw how to use the .NET cryptography features to perform common cryptographic operations, such as encryption, decryption, and hash code validation. The .NET Framework Class Library contains implementations of many encryption and has algorithms, some of which are implemented using underlying Windows features and others of which are ...
openaire +1 more source
In this chapter, we saw how to use the .NET cryptography features to perform common cryptographic operations, such as encryption, decryption, and hash code validation. The .NET Framework Class Library contains implementations of many encryption and has algorithms, some of which are implemented using underlying Windows features and others of which are ...
openaire +1 more source

