Search

Showing total 102 results
102 results

Search Results

1. The Differential Spectrum of the Power Mapping x p n −3.

2. Proposed Model for Cryptographic Security Goals using Analytical Hierarchical Process.

3. The Expansion Complexity of Ultimately Periodic Sequences Over Finite Fields.

4. On the security of consumer wearable devices in the Internet of Things.

5. Narrow-Sense BCH Codes Over \mathrm GF(q) With Length n=\frac q^m-1q-1.

6. Constructing APN Functions Through Isotopic Shifts.

7. A Class of Quadrinomial Permutations With Boomerang Uniformity Four.

8. Several Classes of Minimal Linear Codes With Few Weights From Weakly Regular Plateaued Functions.

9. An efficient and adaptive data-hiding scheme based on secure random matrix.

10. Minimal Linear Codes in Odd Characteristic.

11. Secure two-party computation of solid triangle area and tetrahedral volume based on cloud platform.

12. PPCD: Privacy-preserving clinical decision with cloud support.

13. High capacity reversible data hiding with interpolation and adaptive embedding.

14. Security analysis of elliptic curves with embedding degree 1 proposed in PLOS ONE 2016.

15. Improvement of direct sampling method in transverse electric polarization.

16. An efficient heterogeneous signcryption for smart grid.

17. Cryptanalysis and improvement of an elliptic curve based signcryption scheme for firewalls.

18. A secure heterogeneous mobile authentication and key agreement scheme for e-healthcare cloud systems.

19. A short certificateless aggregate signature against coalition attacks.

20. A novel image encryption scheme based on quantum dynamical spinning and rotations.

21. The Trusted Server: A secure computational environment for privacy compliant evaluations on plain personal data.

22. Evolutionary dynamics of cryptocurrency transaction networks: An empirical study.

23. Walking along the road with anonymous users in similar attributes.

24. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography.

25. Self-recovery reversible image watermarking algorithm.

26. System steganalysis with automatic fingerprint extraction.

27. Unbounded and revocable hierarchical identity-based encryption with adaptive security, decryption key exposure resistant, and short public parameters.

28. Anonymity-preserving Reputation Management System for health sector.

29. A novel encryption scheme for high-contrast image data in the Fresnelet domain.

30. Revocable identity-based proxy re-signature against signing key exposure.

31. An enhanced password authentication scheme for session initiation protocol with perfect forward secrecy.

32. Cryptanalysis and improvement of a biometrics-based authentication and key agreement scheme for multi-server environments.

33. An improved anonymous authentication scheme for roaming in ubiquitous networks.

34. Compact FPGA hardware architecture for public key encryption in embedded devices.

35. A digital memories based user authentication scheme with privacy preservation.

36. A robust anonymous biometric-based authenticated key agreement scheme for multi-server environments.

37. Complex Conjugated certificateless-based signcryption with differential integrated factor for secured message communication in mobile network.

38. Searchable attribute-based encryption scheme with attribute revocation in cloud storage.

39. Provably secure identity-based identification and signature schemes from code assumptions.

40. Security analysis and enhanced user authentication in proxy mobile IPv6 networks.

41. : Oblivious similarity based searching for encrypted data outsourced to an untrusted domain.

42. Does Internet voting make elections less social? Group voting patterns in Estonian e-voting log files (2013–2015).

43. Benchmarking desktop and mobile handwriting across COTS devices: The e-BioSign biometric database.

44. Parallel point-multiplication architecture using combined group operations for high-speed cryptographic applications.

45. Relay discovery and selection for large-scale P2P streaming.

46. A Temporal Credential-Based Mutual Authentication with Multiple-Password Scheme for Wireless Sensor Networks.

47. A Secure and Efficient Scalable Secret Image Sharing Scheme with Flexible Shadow Sizes.

48. Chaos-Based Simultaneous Compression and Encryption for Hadoop.

49. Efficiently Multi-User Searchable Encryption Scheme with Attribute Revocation and Grant for Cloud Storage.

50. A Novel Multi-Receiver Signcryption Scheme with Complete Anonymity.