Results 271 to 280 of about 16,729,036 (330)
Some of the next articles are maybe not open access.

Public-Key Cryptography

2003
Part I: Theory Provable security is an important goal in the design of public-key cryptosystems. For most security properties, it is computational security that has to be considered: an attack scenario describes how adversaries interact with the cryptosystem, trying to attack it; the system can be called secure if adversaries with reasonably bounded ...
openaire   +1 more source

Outdoor air pollution and cancer: An overview of the current evidence and public health recommendations

Ca-A Cancer Journal for Clinicians, 2020
Michelle C Turner   +2 more
exaly  

Transitioning to a Quantum-Resistant Public Key Infrastructure

IACR Cryptology ePrint Archive, 2017
Nina Bindel   +3 more
semanticscholar   +1 more source

Public Key Authentication and Key Agreement in IoT Devices With Minimal Airtime Consumption

IEEE Embedded Systems Letters, 2017
Savio Sciancalepore   +3 more
semanticscholar   +1 more source

Signatures with Flexible Public Key: Introducing Equivalence Classes for Public Keys

International Conference on the Theory and Application of Cryptology and Information Security, 2018
M. Backes   +3 more
semanticscholar   +1 more source

The Complexity of Public-Key Cryptography

Tutorials on the Foundations of Cryptography, 2017
B. Barak
semanticscholar   +1 more source

American Cancer Society guideline for diet and physical activity for cancer prevention

Ca-A Cancer Journal for Clinicians, 2020
Cheryl L Rock   +2 more
exaly  

High-Performance and Lightweight Lattice-Based Public-Key Encryption

IoTPTS@AsiaCCS, 2016
J. Buchmann   +4 more
semanticscholar   +1 more source

Physical activity counseling in primary care: Insights from public health and behavioral economics

Ca-A Cancer Journal for Clinicians, 2017
Kerem Shuval   +2 more
exaly  

Home - About - Disclaimer - Privacy