Results 211 to 220 of about 2,695,884 (227)
On a Probabilistic Approach to the Security Analysis of Cryptographic Hash Functions.
Giuliano Laccetti, Giovanni Schmid
openalex
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Chemical Sniffing Instrumentation for Security Applications
Chemical Reviews, 2016Stamatios Giannoukos+2 more
exaly
Cryptographic hash functions: recent design trends and security notions
Saif Al‐Kuwari+2 more
openalex
Cryptography & Network Security Hash Function Applications, Attacks and Advances: A Review
Arvind K. Sharma, S. K. Mittal
openalex +1 more source
Android Security: A Survey of Issues, Malware Penetration, and Defenses
IEEE Communications Surveys and Tutorials, 2015Mauro Conti, Parvez Faruki, Vijay Laxmi
exaly
A Survey on Cyber Security for Smart Grid Communications
IEEE Communications Surveys and Tutorials, 2012David Tipper, Yi Qian
exaly