Search

Showing total 1,071 results
1,071 results

Search Results

1. A Survey on Emerging Blockchain Technology Platforms for Securing the Internet of Things.

2. A Secure Architecture to Protect the Network from Replay Attacks during Client-to-Client Data Transmission.

3. E-Coin-Based Priced Oblivious Transfer with a Fast Item Retrieval.

4. Methods and Challenges of Cryptography-Based Privacy-Protection Algorithms for Vehicular Networks.

5. Enhancing Smart Communication Security: A Novel Cost Function for Efficient S-Box Generation in Symmetric Key Cryptography.

6. Mixture Differential Cryptanalysis on Round-Reduced SIMON32/64 Using Machine Learning.

7. Information Theory, Living Systems, and Communication Engineering.

8. Physical-Layer Security, Quantum Key Distribution, and Post-Quantum Cryptography.

9. Cryptanalysis of Two Conditional Privacy Preserving Authentication Schemes for Vehicular Ad Hoc Networks.

10. Enhancing Privacy in the Internet of Vehicles via Hyperelliptic Curve Cryptography.

11. Minoan Cryptanalysis: Computational Approaches to Deciphering Linear A and Assessing Its Connections with Language Families from the Mediterranean and the Black Sea Areas.

12. Lattice-Based Threshold Secret Sharing Scheme and Its Applications: A Survey.

13. Research on the Type Synthesis of a Regular Hexagonal Prism Rubik's Cube Mechanism.

14. Development of Security Rules and Mechanisms to Protect Data from Assaults.

15. Two-Layer Security Algorithms to Prevent Attacks on Data in Cyberspace.

16. Tightly-Secure Two-Tier Signatures on Code-Based Digital Signatures with Chameleon Hash Functions.

17. Performance Evaluation of Lightweight Stream Ciphers for Real-Time Video Feed Encryption on ARM Processor.

18. Comprehensive Neural Cryptanalysis on Block Ciphers Using Different Encryption Methods.

19. Steganography in QR Codes—Information Hiding with Suboptimal Segmentation.

20. Design and Implementation of Lightweight Certificateless Secure Communication Scheme on Industrial NFV-Based IPv6 Virtual Networks.

21. A Secure Protocol Authentication Method Based on the Strand Space Model for Blockchain-Based Industrial Internet of Things.

22. Quantum Steganography Based on the B92 Quantum Protocol.

23. A Multi-Party Functional Signatures Scheme for Private Blockchain.

24. Fractal-Based Hybrid Cryptosystem: Enhancing Image Encryption with RSA, Homomorphic Encryption, and Chaotic Maps.

25. S-TrackS: A Secure Snapshot-Based Solution for Positioning and Timing †.

26. Performance Analysis of Post-Quantum Cryptography Algorithms for Digital Signature.

27. Enhancing Steganography through Optimized Quantization Tables.

28. Flexible and Compact MLWE-Based KEM.

29. Integral Cryptanalysis of Reduced-Round IIoTBC-A and Full IIoTBC-B.

30. The Security Evaluation of an Efficient Lightweight AES Accelerator †.

31. Securing Data Exchange with Elliptic Curve Cryptography: A Novel Hash-Based Method for Message Mapping and Integrity Assurance.

32. Constrained Device Performance Benchmarking with the Implementation of Post-Quantum Cryptography.

33. An Engineered Minimal-Set Stimulus for Periodic Information Leakage Fault Detection on a RISC-V Microprocessor.

34. Analysis of Biometric-Based Cryptographic Key Exchange Protocols—BAKE and BRAKE.

35. Auto-Correlation Functions of Chaotic Binary Sequences Obtained by Alternating Two Binary Functions.

36. Passwordless Authentication Using a Combination of Cryptography, Steganography, and Biometrics.

37. Distributed Group Key Management Based on Blockchain.

38. Secure Key Exchange in Tropical Cryptography: Leveraging Efficiency with Advanced Block Matrix Protocols.

39. NDNOTA: NDN One-Time Authentication.

40. Detecting Malicious Devices in IPSEC Traffic with IPv4 Steganography.

41. Emergence of Novel WEDEx-Kerberotic Cryptographic Framework to Strengthen the Cloud Data Security against Malicious Attacks.

42. Novel, Fast, Strong, and Parallel: A Colored Image Cipher Based on SBTM CPRNG.

43. Domain Transformation of Distortion Costs for Efficient JPEG Steganography with Symmetric Embedding.

44. Quantum Implementation of AIM: Aiming for Low-Depth.

45. A Lightweight Image Cryptosystem for Cloud-Assisted Internet of Things.

46. Asymmetric Cryptography Based on the Tropical Jones Matrix.

47. Special Issue on Cryptography and Its Applications in Information Security.

48. Lossless Image Steganography Based on Invertible Neural Networks.

49. Quality Evaluation for Reconstructing Chaotic Attractors.

50. Quantum Image Steganography Schemes for Data Hiding: A Survey.