Results 271 to 280 of about 535,713 (347)

Bio-inspired cryptography based on proteinoid assemblies. [PDF]

open access: yesPLoS One
Mougkogiannis P, Ghadafi E, Adamatzky A.
europepmc   +1 more source

BloomSec: Scalable and privacy-preserving searchable encryption for cloud environments. [PDF]

open access: yesPLoS One
Khan AN   +5 more
europepmc   +1 more source

Public-Key Cryptography

2002
The basic idea of public-key cryptography are public keys. Each person’s key is separated into two parts: a public key for encryption available to everyone and a secret key for decryption which is kept secret by the owner. In this chapter we introduce the concept of public-key cryptography.
Hans Delfs, Helmut Knebl
semanticscholar   +4 more sources

Public-Key Cryptography

EATCS Monographs on Theoretical Computer Science, 1990
A. Salomaa
openaire   +2 more sources

Activation of LoRaWAN End Devices by Using Public Key Cryptography

Cyber Security in Networking Conference, 2020
This paper aims to design a new process to assign root keys to the devices in Long Range Wide Area Network (LoRaWAN) by using Public Key Cryptography (PKC). This process is used to propose a new activation method called Public Key Over the Air Activation
Fredrik Mårlind, I. Butun
semanticscholar   +1 more source

Public Key Cryptography

2021
In this chapter we will discuss public-key cryptography(PKC) and it’s various applications and its probable use. Limitations and disadvantages of symmetric-key cryptography(private-key cryptography) motivates the extensive use of public-key cryptography. Well known limitations are: Key exchange is a major problem in symmetric key cryptography. you
Satyanarayana Vollala   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy