Results 231 to 240 of about 63,410 (288)
ECACS: An Enhanced Certificateless Authentication Scheme for Smart Car Sharing. [PDF]
Shen Z, Kou X, Yang T.
europepmc +1 more source
Privacy-preserving communication in smart city transportation using elliptic curve cryptography. [PDF]
Mohammed ZK +7 more
europepmc +1 more source
Semantic decentralized authentication for IoT-based e-learning using Hedera Hashgraph and Knowledge Graphs. [PDF]
Luo L, Zhang Y, Tang Q.
europepmc +1 more source
Two secure authentication protocols for mitigating vulnerabilities in IoD. [PDF]
Safkhani M, Ghorbani Fard M.
europepmc +1 more source
The State of Practice About Security in Telemedicine Systems in Chile: Exploratory Study.
Marquez G +5 more
europepmc +1 more source
Post Quantum Public and Private Key Cryptography Optimized for IoT Security
The number of Internet of Things devices is growing exponentially with the introduction of 5G. They are incorporated into a wide spectrum of devices ranging from our mobile phones to healthcare tracking devices. With the advent of 5G and quantum computers, traditional cryptography algorithms will be deprecated and will be prone to quantum attacks by ...
Ajay Kaushik +8 more
openaire +3 more sources
Microprocessor architecture for private-key cryptography
A novel generic instructions set for a RISC microprocessor designed to accelerate the performance of all private-key cryptographic algorithms is described in this paper. The RISC microprocessor has coprocessors and instruction extensions designed to specifically implement and accelerate the Rijndael and DES private key algorithms.
Neil Smyth
openaire +2 more sources
Public and Private Key Cryptography
Please download the sample Excel files from https://github.com/hhohho/master-Excel-through-projects for this chapter’s exercises.
Hong Zhou
openaire +2 more sources

