Results 191 to 200 of about 34,780 (224)
Some of the next articles are maybe not open access.

Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions

International Conference on the Theory and Application of Cryptology and Information Security, 2016
Rongmao Chen   +5 more
semanticscholar   +1 more source

Global threats to human water security and river biodiversity

Nature, 2010
Mark O Gessner   +2 more
exaly  

A Systematic Survey of Industrial Internet of Things Security: Requirements and Fog Computing Opportunities

IEEE Communications Surveys and Tutorials, 2020
Michele De Donno   +2 more
exaly  

A Survey on Security and Privacy Issues of Bitcoin

IEEE Communications Surveys and Tutorials, 2018
E Sandeep Kumar   +2 more
exaly  

Bad directions in cryptographic hash functions

IACR Cryptology ePrint Archive, 2015
D. Bernstein   +3 more
semanticscholar   +1 more source

Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges

IEEE Communications Surveys and Tutorials, 2017
Hsiao-hwa Chen   +2 more
exaly  

The security of practical quantum key distribution

Reviews of Modern Physics, 2009
Valerio Scarani   +2 more
exaly  

Network Intrusion Detection for IoT Security Based on Learning Techniques

IEEE Communications Surveys and Tutorials, 2019
Nadia Chaabouni   +2 more
exaly  

A Survey on Emerging SDN and NFV Security Mechanisms for IoT Systems

IEEE Communications Surveys and Tutorials, 2019
Jaeseung Song, Ivan Farris, Tarik Taleb
exaly  

Home - About - Disclaimer - Privacy