Results 181 to 190 of about 2,695,884 (227)
Some of the next articles are maybe not open access.
A Survey on Metaverse: Fundamentals, Security, and Privacy
IEEE Communications Surveys and Tutorials, 2023Yuntao Wang, Zhou Su, Xiaofeng Tao
exaly
Cryptographic security evaluation of MD4 hash function
E. Abdel-Azeem+2 more
openalex +1 more source
Weak Security Notions of Cryptographic Unkeyed Hash Functions and Their Amplifiability
Shoichi Hirose
openalex +1 more source
A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security
IEEE Communications Surveys and Tutorials, 2020Abdulla Al-ali, Amr Mohamed, Ihsan Ali
exaly
A Technique for Boosting the Security of Cryptographic Systems with One-Way Hash Functions
Takeshi Koshiba
openalex +1 more source
Black-Box Property of Cryptographic Hash Functions
Foundations and Practice of Security, 2011Michal Rjasko
semanticscholar +1 more source
Machine Learning in IoT Security: Current Solutions and Future Challenges
IEEE Communications Surveys and Tutorials, 2020Ekram Hossain+2 more
exaly
Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions
International Conference on the Theory and Application of Cryptology and Information Security, 2016Rongmao Chen+5 more
semanticscholar +1 more source