Results 281 to 290 of about 2,069,680 (303)
Some of the next articles are maybe not open access.
The Kish Cypher - The Story of KLJN for Unconditional Security
The Kish Cypher, 2014L. Kish
semanticscholar +1 more source
How to Use Pseudorandom Generators in Unconditional Security Settings
Provable Security, 2014K. Nuida
semanticscholar +1 more source
Unconditional security based privacy protected user communication in Wireless Mesh Networks
2012 International Conference on Recent Advances in Computing and Software Systems, 2012Kathyaini N A, A. S
semanticscholar +1 more source
Nano-enabled pesticides for sustainable agriculture and global food security
Nature Nanotechnology, 2022Deng-jun Wang, Navid B Saleh, Kay T Ho
exaly
Circularly polarized lanthanide luminescence for advanced security inks
Nature Reviews Chemistry, 2020Lewis Edward MacKenzie, Robert Pal
exaly
A Survey on Security Aspects for 3GPP 5G Networks
IEEE Communications Surveys and Tutorials, 2020Jin Cao, Maod, Hui Li
exaly
The security of practical quantum key distribution
Reviews of Modern Physics, 2009Valerio Scarani +2 more
exaly
Security Services Using Blockchains: A State of the Art Survey
IEEE Communications Surveys and Tutorials, 2019Tara Salman +2 more
exaly
Cyber Security and Privacy Issues in Smart Grids
IEEE Communications Surveys and Tutorials, 2012Yang Xiao, Tieshan Li, Wei Liang
exaly

