Results 271 to 280 of about 40,010 (281)
Some of the next articles are maybe not open access.

Auditory Cryptography (k, n) threshold Watermarking Algorithm

International Journal of Digital Content Technology and its Applications, 2011
Huan Li -   +3 more
openaire   +1 more source

A survey of applications of threshold cryptography—proposed and practiced

Information Security Journal, 2016
Vishnu Venukumar, Vinod Pathari
exaly  

Threshold cryptography in P2P and MANETs: The case of access control

Computer Networks, 2007
Nitesh Saxena   +2 more
exaly  

A Novel Threshold Cryptography with Membership Authentication and Key Establishment

Wireless Personal Communications, 2017
Ching-Fang Hsu, Lein Harn
exaly  

Post-quantum cryptography

Nature, 2017
Daniel J Bernstein, Tanja Lange
exaly  

Post-Quantum Lattice-Based Cryptography Implementations

ACM Computing Surveys, 2019
Hamid Nejatollahi   +2 more
exaly  

A Simulated Annealing Algorithm for General Threshold Visual Cryptography Schemes

IEEE Transactions on Information Forensics and Security, 2011
exaly  

Home - About - Disclaimer - Privacy