Results 281 to 289 of about 61,999 (289)
Some of the next articles are maybe not open access.
A Survey of Applications of Identity-Based Cryptography in Mobile Ad-Hoc Networks
IEEE Communications Surveys and Tutorials, 2012exaly
Developing an Application for Managing and Creating Private Keys for Cryptographic Communication
Kiran Gowda +4 more
openalex +1 more source
Solution-processed memristors: performance and reliability
Nature Reviews MaterialsSebastián Matías Pazos +2 more
exaly
Usage of Mixed Private-key Cryptography in the Safe Operation of Digital Library
Lou Rongsheng
openalex
Performance Estimates of Cryptographic Hash vis-à-vis Secret Key and Public/Private Key Operations
Praveen Kumar Gupta, K. Swapna
openalex
Ciphers and their products: group theory in private key cryptography
E. Bruce Lee, John O. Pliam
openalex
Asynchronous Distributed Private-Key Generators for Identity-Based Cryptography
Aniket Kate +2 more
openalex
Small private keys for systems of multivariate quadratic equations using symmetric cryptography
Fábio Borges +2 more
openalex

