Results 321 to 330 of about 511,689 (360)
Some of the next articles are maybe not open access.

Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures

IEEE Transactions on Information Forensics and Security, 2016
De-biao He   +3 more
semanticscholar   +1 more source

Public-Key Cryptography in the Fine-Grained Setting

IACR Cryptology ePrint Archive, 2019
Rio LaVigne   +2 more
semanticscholar   +1 more source

Lossless and Reversible Data Hiding in Encrypted Images With Public-Key Cryptography

IEEE transactions on circuits and systems for video technology (Print), 2016
Xinpeng Zhang   +3 more
semanticscholar   +1 more source

The Complexity of Public-Key Cryptography

Tutorials on the Foundations of Cryptography, 2017
B. Barak
semanticscholar   +1 more source

Introduction to Public Key Cryptography

1993
We begin with an introduction to private and public key cryptography, and then proceed to introduce elliptic curve cryptosystems.
openaire   +2 more sources

Outdoor air pollution and cancer: An overview of the current evidence and public health recommendations

Ca-A Cancer Journal for Clinicians, 2020
Michelle C Turner   +2 more
exaly  

Encrypted image-based reversible data hiding with public key cryptography from difference expansion

Signal processing. Image communication, 2015
Chih-Wei Shiu, Yu-Chi Chen, Wien Hong
semanticscholar   +1 more source

Image encryption and decryption in public key cryptography based on MR

International Conference on Computing and Convergence Technology, 2015
Hiral Rathod, M. S. Sisodia, A. N. Reddy
semanticscholar   +1 more source

Implementing public-key cryptography on passive RFID tags is practical

International Journal of Information Security, 2014
Alex Arbit   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy