Results 191 to 200 of about 34,780 (224)
Some of the next articles are maybe not open access.
Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions
International Conference on the Theory and Application of Cryptology and Information Security, 2016Rongmao Chen+5 more
semanticscholar +1 more source
Cryptographic Hash Functions and Expander Graphs: The End of the Story?
The New Codebreakers, 2015C. Petit, J. Quisquater
semanticscholar +1 more source
Global threats to human water security and river biodiversity
Nature, 2010Mark O Gessner+2 more
exaly
A Survey on Security and Privacy Issues of Bitcoin
IEEE Communications Surveys and Tutorials, 2018E Sandeep Kumar+2 more
exaly
Bad directions in cryptographic hash functions
IACR Cryptology ePrint Archive, 2015D. Bernstein+3 more
semanticscholar +1 more source
The security of practical quantum key distribution
Reviews of Modern Physics, 2009Valerio Scarani+2 more
exaly
Network Intrusion Detection for IoT Security Based on Learning Techniques
IEEE Communications Surveys and Tutorials, 2019Nadia Chaabouni+2 more
exaly
A Survey on Emerging SDN and NFV Security Mechanisms for IoT Systems
IEEE Communications Surveys and Tutorials, 2019Jaeseung Song, Ivan Farris, Tarik Taleb
exaly