Results 251 to 260 of about 810,634 (263)
Some of the next articles are maybe not open access.

The Mathematics of Public-Key Cryptography

Scientific American, 1979
The electronic communications systems that are proliferating throughout modern society offer speed, accuracy and ever diminishing cost. They also present serious problems of security. As the ordinary transactions cond ucted in person, on the telephone or by written co respondence have come increasingly to be conducted by new kinds of electronic systems
openaire   +2 more sources

Public-Key Cryptography and Availability

2005
When the safety community designs their systems to also maintain security properties, it is likely that public-key encryption will be among the tools that are applied. The security guarantees of this technology are based on a particular model of computation.
Tage Stabell-Kulø, Simone Lupetti
openaire   +2 more sources

Introduction to Public-Key Cryptography [PDF]

open access: possible, 2014
Cryptography was once considered to be a means of maintaining secrecy of communications only in military affairs and diplomacy. However, today, modern cryptography is used for various purposes in familiar circumstances. Public-key cryptography is a key technology of modern society; it is used for personal authentication, electronic commerce on the ...
openaire   +1 more source

Encrypted image-based reversible data hiding with public key cryptography from difference expansion

Signal processing. Image communication, 2015
Chih-Wei Shiu, Yu-Chi Chen, Wien Hong
semanticscholar   +1 more source

Implementing public-key cryptography on passive RFID tags is practical

International Journal of Information Security, 2014
Alex Arbit   +3 more
semanticscholar   +1 more source

Design and Implementation to Authentication over a GSM System Using Certificate-Less Public Key Cryptography (CL-PKC)

Wireless personal communications, 2014
I. Memon   +5 more
semanticscholar   +1 more source

Public-Key Cryptography – PKC 2013

Lecture Notes in Computer Science, 2013
K. Kurosawa, Goichiro Hanaoka
semanticscholar   +1 more source

Public Key Cryptography – PKC 2012

Lecture Notes in Computer Science, 2012
M. Fischlin, J. Buchmann, M. Manulis
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy