Search

Showing total 10,672 results

Search Constraints

Start Over You searched for: Search Limiters Full Text Remove constraint Search Limiters: Full Text Topic cryptography Remove constraint Topic: cryptography Language english Remove constraint Language: english
10,672 results

Search Results

1. Securing Information Systems in an Uncertain World Enterprise Level Security (Invited Paper)

2. Security in Computer and Information Sciences. Second International Symposium, EuroCybersec 2021, Nice, France, October 25-26, 2021, Revised Selected Papers.

3. Rethinking blockchain security: Position paper

4. Report of the Public Cryptography Study Group.

5. Research on Digital Steganography and Image Synthesis Model Based on Improved Wavelet Neural Network.

6. Guest Editorial: Selected papers from the 24th International Conference on Information Security and Cryptology (ICISC 2021).

7. Invited Paper: Secure Boot and Remote Attestation in the Sanctum Processor

8. Secret Writing on Dirty Paper: A Deterministic View.

9. Parallel Search Using Probabilistic DNA Sticker Model to Cryptanyze One Time Pad Polyalphabetic Cipher.

10. Writing on wet paper.

11. Relative Generalized Hamming Weights of One-Point Algebraic Geometric Codes<xref ref-type="fn" rid="fn1">1</xref><fn id="fn1"><label>1</label><p>The paper is registered to the ORCID of Olav Geil. For more details please visit ...

12. Errorless robust JPEG steganography using steganographic polar codes.

14. E-Coin-Based Priced Oblivious Transfer with a Fast Item Retrieval.

15. Short paper: Practically Unbounded One-Way Chains for Authentication with Backward Secrecy

16. New Variations of Discrete Logarithm Problem.

17. History, decoded.

18. Machine Learning and Applied Cryptography.

19. Methods and Challenges of Cryptography-Based Privacy-Protection Algorithms for Vehicular Networks.

20. On a class of permutation trinomials over finite fields.

21. Enhancing Security with Multi-level Steganography: A Dynamic Least Significant Bit and Wavelet-Based Approach.

22. Enhancing Smart Communication Security: A Novel Cost Function for Efficient S-Box Generation in Symmetric Key Cryptography.

23. Survey of research on confidential computing.

24. A Secure Architecture to Protect the Network from Replay Attacks during Client-to-Client Data Transmission.

25. Hamming codes for wet paper steganography.

26. Fast edge integration based active contours for color images

28. DIGITAL CURRENCY: A CONCEPTUAL FRAMEWORK OF PERFORMANCE.

29. Mixture Differential Cryptanalysis on Round-Reduced SIMON32/64 Using Machine Learning.

30. Information Theory, Living Systems, and Communication Engineering.

31. Motion vector‐domain video steganalysis exploiting skipped macroblocks.

32. Secure encryption over the ring F2 + uF2 + vF2 + uvF2.

33. IoT Security for D-App in Supply Chain Management.

34. Reversible Logic Gates and Applications - A Low Power Solution to VLSI Chips.

35. Cryptanalysis of Two Conditional Privacy Preserving Authentication Schemes for Vehicular Ad Hoc Networks.

36. Possibility of land ownership transaction with non-fungible token technology: Minting survey plan.

37. Ethics of Quantum Computing: an Outline.

38. Assessing learning engagement based on facial expression recognition in MOOC’s scenario

39. Physical-Layer Security, Quantum Key Distribution, and Post-Quantum Cryptography.

40. Development of Security Rules and Mechanisms to Protect Data from Assaults.

41. A large-scale data security detection method based on continuous time graph embedding framework.

42. A Multi-Party Functional Signatures Scheme for Private Blockchain.

43. Enhancing Privacy in the Internet of Vehicles via Hyperelliptic Curve Cryptography.

44. Minoan Cryptanalysis: Computational Approaches to Deciphering Linear A and Assessing Its Connections with Language Families from the Mediterranean and the Black Sea Areas.

45. Lattice-Based Threshold Secret Sharing Scheme and Its Applications: A Survey.

46. Secure Smart Contract Based on Blockchain to Prevent the Non-Repudiation Phenomenon.

47. Research on the Type Synthesis of a Regular Hexagonal Prism Rubik's Cube Mechanism.

48. Two-Layer Security Algorithms to Prevent Attacks on Data in Cyberspace.

50. Efficient post-quantum secure deterministic wallet scheme.