Results 271 to 280 of about 49,036 (287)
Some of the next articles are maybe not open access.
Pseudonym Schemes in Vehicular Networks: A Survey
IEEE Communications Surveys and Tutorials, 2015Jonathan Petit +2 more
exaly
Cellular automata computations and secret key cryptography
Parallel Computing, 2004Franciszek Seredynski, Pascal Bouvry
exaly
A Survey of Applications of Identity-Based Cryptography in Mobile Ad-Hoc Networks
IEEE Communications Surveys and Tutorials, 2012exaly
Quantum Cryptography in 5G Networks: A Comprehensive Overview
IEEE Communications Surveys and TutorialsMiralem Mehic +2 more
exaly
Post-Quantum Lattice-Based Cryptography Implementations
ACM Computing Surveys, 2019Hamid Nejatollahi +2 more
exaly
Multi-core implementation of the symmetric cryptography algorithms in the measurement system
Measurement: Journal of the International Measurement Confederation, 2010exaly
Symmetric-key block cipher for image and text cryptography
International Journal of Imaging Systems and Technology, 2005exaly

