Results 131 to 140 of about 3,313 (171)

Authenticated key agreement protocol for virtual private network based on certificateless cryptography

2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONIC ENGINEERING (ICCEEE), 2013
Virtual Private Networks have been efficient tools that provide inter-connectivity to exchange information between different (remote) parties that belong to a specific network. A virtual private network possesses all the features of the private networks and are built upon existing network, but they suffer severe security problems, particularly, the ...
Abeer E. W. Eldewahi, Eihab Basheir
openaire   +2 more sources

Security in quantum cryptography

Reviews of Modern Physics, 2022
Christopher Portmann, Renato Renner
exaly  

Digital Signature and Private Key Cryptography Mechanisms for Enhancing Node Authentication in WSN

2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS), 2023
K Suriyakrishnaan   +3 more
openaire   +1 more source

Entanglement-based secure quantum cryptography over 1,120 kilometres

Nature, 2020
Juan Yin, Yu-Huai Li, Sheng-Kai Liao
exaly  

Strategies for delivering therapeutics across the blood–brain barrier

Nature Reviews Drug Discovery, 2021
Georg C Terstappen, Wandong Zhang
exaly  

Home - About - Disclaimer - Privacy