Results 271 to 280 of about 573,752 (297)
Some of the next articles are maybe not open access.
Implementing public-key cryptography on passive RFID tags is practical
International Journal of Information Security, 2014Alex Arbit +3 more
semanticscholar +1 more source
Post-Quantum Lattice-Based Cryptography Implementations
ACM Computing Surveys, 2019Hamid Nejatollahi +2 more
exaly
A light-weight certificate-less public key cryptography scheme based on ECC
International Conference on Computer Communications and Networks, 2014Xuanxia Yao, Xiaoguang Han, Xiaojiang Du
semanticscholar +1 more source
A Survey of Public-Key Cryptographic Primitives in Wireless Sensor Networks
IEEE Communications Surveys and Tutorials, 2016Kyung-Ah Shim
exaly
Cancer Risk Elicitation and Communication: Lessons from the Psychology of Risk Perception
Ca-A Cancer Journal for Clinicians, 2007Michael E Stefanek
exaly
Public key cryptography using neural networks and genetic algorithms
International Conference on Contemporary Computing, 2013Smita Jhajharia +2 more
semanticscholar +1 more source
Hardware architectures for public key cryptography
The Integration VLSI Journal, 2003Lejla Batina +2 more
exaly
Securing M2M With Post-Quantum Public-Key Cryptography
IEEE Journal on Emerging and Selected Topics in Circuits and Systems, 2013Jie-Ren Shih +7 more
semanticscholar +1 more source

