Results 281 to 288 of about 63,410 (288)
Utilizing GPU Virtualization to Protect the Private Keys of GPU Cryptographic Computation
Ziyang Wang +3 more
openalex +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
A Survey of Applications of Identity-Based Cryptography in Mobile Ad-Hoc Networks
IEEE Communications Surveys and Tutorials, 2012exaly
Review Paper On Private Key With Share Key Of Variable Size Based Cryptographic Algorithm
nbspAnkit Pawar +3 more
openalex
Solution-processed memristors: performance and reliability
Nature Reviews MaterialsSebastián Matías Pazos +2 more
exaly
Reversible Data Hiding in Encrypted Images with Private Key Cryptography
Wajahath Hussain Razvi, Ch. Samson
openalex
Developing an Application for Managing and Creating Private Keys for Cryptographic Communication
Kiran Gowda +4 more
openalex +1 more source
Performance Estimates of Cryptographic Hash vis-à-vis Secret Key and Public/Private Key Operations
Praveen Kumar Gupta, K. Swapna
openalex

