Results 221 to 230 of about 138,401 (282)
Lightweight authentication for IoT devices (LAID) in sustainable smart cities. [PDF]
Khalique A +3 more
europepmc +1 more source
Variations on the Expectation Due to Changes in the Probability Measure. [PDF]
Perlaza SM, Bisson G.
europepmc +1 more source
A Secure and Efficient Authentication Scheme with Privacy Protection for Internet of Medical Things. [PDF]
Xu F, Wu J, An Q, Ziaur R.
europepmc +1 more source
Certificateless aggregate signcryption scheme with multi-ciphertext equality test for the internet of vehicles. [PDF]
Yang X, Luo X, Liu R, Li S, Yao K.
europepmc +1 more source
An Adaptive Robust Event-Triggered Variational Bayesian Filtering Method with Heavy-Tailed Noise. [PDF]
Deng D, Yi P, Xiong J.
europepmc +1 more source
THROTTLING DDoS ATTACKS USING DISCRETE LOGARITHM PROBLEM
openaire +1 more source
Conscious active inference I: A quantum model naturally implements the path integral needed for real-time planning and control. [PDF]
Wiest MC, Puniani AS.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
The Discrete Logarithm Problem
1993There are many public-key cryptosystems whose security lies in the presumed intractability of the discrete logarithm problem in some group G. The discrete logarithm problem has received a great deal of attention in recent years, and numerous algorithms which use a variety of techniques have been devised.
Ian F. Blake +4 more
openaire +2 more sources

