Results 191 to 200 of about 2,695,884 (227)
Some of the next articles are maybe not open access.
Security and Privacy for 6G: A Survey on Prospective Technologies and Challenges
IEEE Communications Surveys and Tutorials, 2021Bo-chao Cheng+2 more
exaly
Incremental cryptography and security of public hash functions
Tola John Odule
openalex +1 more source
A Survey on Space-Air-Ground-Sea Integrated Network Security in 6G
IEEE Communications Surveys and Tutorials, 2022Hongzhi Guo, Jingyi Li, Jiajia Liu
exaly
Cryptographic Hash Functions and Expander Graphs: The End of the Story?
The New Codebreakers, 2015C. Petit, J. Quisquater
semanticscholar +1 more source
Bad directions in cryptographic hash functions
IACR Cryptology ePrint Archive, 2015D. Bernstein+3 more
semanticscholar +1 more source
Global threats to human water security and river biodiversity
Nature, 2010Mark O Gessner+2 more
exaly
Cryptographic Hash Functions and Some Applications to Information Security
Lisa Bromberg
openalex +1 more source
A Survey on Security and Privacy Issues of Bitcoin
IEEE Communications Surveys and Tutorials, 2018E Sandeep Kumar+2 more
exaly