Results 181 to 190 of about 34,780 (224)
Some of the next articles are maybe not open access.
A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security
IEEE Communications Surveys and Tutorials, 2020Abdulla Al-ali, Amr Mohamed, Ihsan Ali
exaly
One-Way Cryptographic Hash Function Securing Networks
2022Vijay Anant Athavale+3 more
openaire +1 more source
High speed calculation of cryptographic hash functions by CNN chips
1998 Fifth IEEE International Workshop on Cellular Neural Networks and their Applications. Proceedings (Cat. No.98TH8359), 1998M. Csapodi, J. Vandewalle, T. Roska
semanticscholar +1 more source
Machine Learning in IoT Security: Current Solutions and Future Challenges
IEEE Communications Surveys and Tutorials, 2020Ekram Hossain+2 more
exaly
Black-Box Property of Cryptographic Hash Functions
Foundations and Practice of Security, 2011Michal Rjasko
semanticscholar +1 more source
Security and Privacy for 6G: A Survey on Prospective Technologies and Challenges
IEEE Communications Surveys and Tutorials, 2021Bo-chao Cheng+2 more
exaly
Incremental cryptography and security of public hash functions
Tola John Odule
openalex +1 more source
A Survey on Space-Air-Ground-Sea Integrated Network Security in 6G
IEEE Communications Surveys and Tutorials, 2022Hongzhi Guo, Jingyi Li, Jiajia Liu
exaly