Results 231 to 240 of about 573,752 (297)
WAWA: Wavelet Analysis-Based Watermarking Authentication for GNSS Civil Signal with Immediate Symbol-Level Verification. [PDF]
Tang X, Tang X, Lin H, Wu Y, Sun G.
europepmc +1 more source
A lightweight and secure authentication and privacy protection scheme for internet of medical things. [PDF]
Kumar S, Abhishek K, Selvarajan S.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Survey on Issues and Recent Advances in Vehicular Public-Key Infrastructure (VPKI)
IEEE Communications Surveys and Tutorials, 2022Public-key infrastructure (PKI) provides the essential foundation for public-key cryptography, and security is often bootstrapped from a PKI. Standardization bodies, organizations, researchers, and experts reached a consensus that deploying Vehicular PKI
Salabat Khan +5 more
semanticscholar +3 more sources
Optical encryption based on ghost imaging and public key cryptography
Optics and Lasers in Engineering, 2018In this paper, according to the phase object in the ghost imaging has a stealth effect, we proposed an optical encryption method based on compressive ghost imaging and public key cryptography.
Kang Yi, Leihong Zhang, Z. Dawei
semanticscholar +3 more sources
2002
The basic idea of public-key cryptography are public keys. Each person’s key is separated into two parts: a public key for encryption available to everyone and a secret key for decryption which is kept secret by the owner. In this chapter we introduce the concept of public-key cryptography.
Hans Delfs, Helmut Knebl
semanticscholar +4 more sources
The basic idea of public-key cryptography are public keys. Each person’s key is separated into two parts: a public key for encryption available to everyone and a secret key for decryption which is kept secret by the owner. In this chapter we introduce the concept of public-key cryptography.
Hans Delfs, Helmut Knebl
semanticscholar +4 more sources
IEEE Transactions on Information Forensics and Security, 2016
De-biao He +3 more
semanticscholar +3 more sources
De-biao He +3 more
semanticscholar +3 more sources
Encrypted image-based reversible data hiding with public key cryptography from difference expansion
Signal Processing: Image Communication, 2015Chih-Wei Shiu, Yu-Chi Chen, Wien Hong
semanticscholar +3 more sources
Lossless and Reversible Data Hiding in Encrypted Images With Public-Key Cryptography
IEEE Transactions on Circuits and Systems for Video Technology, 2016Xinpeng Zhang +3 more
semanticscholar +3 more sources
Optical image encryption algorithm based on hyper-chaos and public-key cryptography
Optics and Laser Technology, 2020Aiming at the problem of secure transmission and distribution of complex keys in image encryption system based on optical transformation, an innovative optical image encryption algorithm is proposed based on hyper-chaos and public key cryptography ...
Yujia Liu +4 more
semanticscholar +1 more source

