Results 181 to 190 of about 34,780 (224)
Some of the next articles are maybe not open access.

A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security

IEEE Communications Surveys and Tutorials, 2020
Abdulla Al-ali, Amr Mohamed, Ihsan Ali
exaly  

One-Way Cryptographic Hash Function Securing Networks

2022
Vijay Anant Athavale   +3 more
openaire   +1 more source

High speed calculation of cryptographic hash functions by CNN chips

1998 Fifth IEEE International Workshop on Cellular Neural Networks and their Applications. Proceedings (Cat. No.98TH8359), 1998
M. Csapodi, J. Vandewalle, T. Roska
semanticscholar   +1 more source

Machine Learning in IoT Security: Current Solutions and Future Challenges

IEEE Communications Surveys and Tutorials, 2020
Ekram Hossain   +2 more
exaly  

Black-Box Property of Cryptographic Hash Functions

Foundations and Practice of Security, 2011
Michal Rjasko
semanticscholar   +1 more source

A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions

IEEE Communications Surveys and Tutorials, 2020
Rabia Khan   +2 more
exaly  

Security and Privacy for 6G: A Survey on Prospective Technologies and Challenges

IEEE Communications Surveys and Tutorials, 2021
Bo-chao Cheng   +2 more
exaly  

A Survey on Space-Air-Ground-Sea Integrated Network Security in 6G

IEEE Communications Surveys and Tutorials, 2022
Hongzhi Guo, Jingyi Li, Jiajia Liu
exaly  

Home - About - Disclaimer - Privacy