BEZPIECZNE PRZECHOWYWANIE HASŁA Z FUNKCJĄ KRYPTOGRAFICZNEGO HASH
Yuliia STEPANENKO+3 more
openaire +1 more source
Blockchain ensuring academic integrity with a degree verification prototype. [PDF]
Cardenas-Quispe MA, Pacheco A.
europepmc +1 more source
Blockchain enabled traceability in the jewel supply chain. [PDF]
Patel A+4 more
europepmc +1 more source
Bases selection with pseudo-random functions in BB84 scheme
Because the spectrum of services available in modern telecommunication networks is constantly expanding, security has become increasingly important. Simultaneously, in an era of constant progress in mathematics and computing, the security of existing ...
Emir Dervisevic+2 more
doaj
Preserving Privacy of Internet of Things Network with Certificateless Ring Signature. [PDF]
Zhang Y, Duan P, Li C, Zhang H, Ahmad H.
europepmc +1 more source
Quantum-resilient software security: A fuzzy AHP-based assessment framework in the era of quantum computing. [PDF]
Almotiri SH.
europepmc +1 more source
A traceable authentication system based on blockchain for decentralized physical infrastructure networks. [PDF]
Liu L, Omote K.
europepmc +1 more source
Algorithm for Key Transparency with Transparent Logs. [PDF]
Mollakuqe E+4 more
europepmc +1 more source
Privacy-preserving and verifiable spectral graph analysis in the cloud. [PDF]
Song Y.
europepmc +1 more source
ESHA-256_GBGO: a high-performance and optimized security framework for internet of medical thing. [PDF]
Murugan G, Chinnadurai M.
europepmc +1 more source