Results 271 to 280 of about 573,752 (297)
Some of the next articles are maybe not open access.

Implementing public-key cryptography on passive RFID tags is practical

International Journal of Information Security, 2014
Alex Arbit   +3 more
semanticscholar   +1 more source

Post-Quantum Lattice-Based Cryptography Implementations

ACM Computing Surveys, 2019
Hamid Nejatollahi   +2 more
exaly  

A light-weight certificate-less public key cryptography scheme based on ECC

International Conference on Computer Communications and Networks, 2014
Xuanxia Yao, Xiaoguang Han, Xiaojiang Du
semanticscholar   +1 more source

A Survey of Public-Key Cryptographic Primitives in Wireless Sensor Networks

IEEE Communications Surveys and Tutorials, 2016
Kyung-Ah Shim
exaly  

Cancer Risk Elicitation and Communication: Lessons from the Psychology of Risk Perception

Ca-A Cancer Journal for Clinicians, 2007
Michael E Stefanek
exaly  

Public key cryptography using neural networks and genetic algorithms

International Conference on Contemporary Computing, 2013
Smita Jhajharia   +2 more
semanticscholar   +1 more source

Hardware architectures for public key cryptography

The Integration VLSI Journal, 2003
Lejla Batina   +2 more
exaly  

Securing M2M With Post-Quantum Public-Key Cryptography

IEEE Journal on Emerging and Selected Topics in Circuits and Systems, 2013
Jie-Ren Shih   +7 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy