Results 131 to 140 of about 3,313 (171)
Emerging Security Solutions Using Public and Private Key Cryptography
openaire +3 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONIC ENGINEERING (ICCEEE), 2013
Virtual Private Networks have been efficient tools that provide inter-connectivity to exchange information between different (remote) parties that belong to a specific network. A virtual private network possesses all the features of the private networks and are built upon existing network, but they suffer severe security problems, particularly, the ...
Abeer E. W. Eldewahi, Eihab Basheir
openaire +2 more sources
Virtual Private Networks have been efficient tools that provide inter-connectivity to exchange information between different (remote) parties that belong to a specific network. A virtual private network possesses all the features of the private networks and are built upon existing network, but they suffer severe security problems, particularly, the ...
Abeer E. W. Eldewahi, Eihab Basheir
openaire +2 more sources
Security in quantum cryptography
Reviews of Modern Physics, 2022Christopher Portmann, Renato Renner
exaly
Digital Signature and Private Key Cryptography Mechanisms for Enhancing Node Authentication in WSN
2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS), 2023K Suriyakrishnaan +3 more
openaire +1 more source
Entanglement-based secure quantum cryptography over 1,120 kilometres
Nature, 2020Juan Yin, Yu-Huai Li, Sheng-Kai Liao
exaly
Strategies for delivering therapeutics across the blood–brain barrier
Nature Reviews Drug Discovery, 2021Georg C Terstappen, Wandong Zhang
exaly

