Results 281 to 290 of about 177,129 (337)
A survey on security of mobile handheld devices through elliptic curve cryptography
V Ajithkumar, K. Satyanarayan Reddy
openalex +1 more source
EAIA: An Efficient and Anonymous Identity-Authentication Scheme in 5G-V2V. [PDF]
Du Q, Zhou J, Ma M.
europepmc +1 more source
Woodward and Hoffmann. Hoffmann and Woodward. A Close Collaboration Had Yet to Begin**
Roald Hoffmann's laboratory notebooks and letters provide an inside glimpse into his relationship with R. B. Woodward and the history of the Woodward‐Hoffmann rules. Abstract In 1965, R. B. Woodward and Roald Hoffmann published five communications in the Journal of the American Chemical Society in which they outlined the mechanisms of ...
Jeffrey I. Seeman
wiley +1 more source
Intelligent two-phase dual authentication framework for Internet of Medical Things. [PDF]
Asif M+6 more
europepmc +1 more source
A Study on the Performance of Secure Elliptic Curves for Cryptographic Purposes
Raúl Durán Dı́az+3 more
openalex +1 more source
Sustainable extraction methods for converting diverse biomass waste into nanocellulose with remarkable biomedical properties were explored. Optimized pretreatment, mechanical processing, and surface modification techniques that enhanced the functionality of nanocellulose were detailed.
Mehrdad Ghamari+8 more
wiley +1 more source
A secure transaction and smart contract architecture for internet of vehicles. [PDF]
Lin HY.
europepmc +1 more source
Comparative Analysis of Authenticated Key Agreement Protocols Based on Elliptic Curve Cryptography
S. U. Nimbhorkar, Latesh Malik
openalex +1 more source
A novel method for generating public keys involving matrix operations. [PDF]
Sun X, Han J, Lv B, Sun C, Zeng C.
europepmc +1 more source