Search

Your search keyword '"Strong key"' showing total 35 results

Search Constraints

Start Over You searched for: Descriptor "Strong key" Remove constraint Descriptor: "Strong key" Topic computer Remove constraint Topic: computer
35 results on '"Strong key"'

Search Results

1. Efficient and Secure Identity-based Strong Key-Insulated Signature Scheme without Pairings

2. Key regeneration-free ciphertext-policy attribute-based encryption and its application

3. Using Smartphones to Enable Low-Cost Secure Consumer IoT Devices

5. Securing content-centric networks with content-based encryption

6. Crypto Key Protection Generated from Images and Chaotic Logistic Maps

7. Privacy Protection and User Traceability in Strong Key-Exposure Resilient Auditing for Cloud Storage

8. Identity-Based Public Auditing Scheme for Cloud Storage with Strong Key-Exposure Resilience

9. Strong Key-Exposure Resilient Auditing for Secure Cloud Storage

10. Security analysis of fast inter-LMA domain handover scheme in proxy mobile IPv6 networks

11. Efficient ID-based Key-insulated Multi Signature Scheme without Pairings

12. Electronic Medical Information Encryption Using Modified Blowfish Algorithm

13. Efficient Strong Key Indistinguishable Access Control in Dynamic Hierarchies with Constant Decryption Cost

14. Analysis and Implementation of Combined Approach of RSA and ECC Algorithm for Enhanced Data Security

15. An improved certificateless strong key-insulated signature scheme in the standard model

16. An Efficient Provably Secure Password-Based Authenticated Key Agreement

17. VTBPEKE: Verifier-based Two-Basis Password Exponential Key Exchange

18. A New Color Image Encryption Scheme Based on Chaos

19. An efficient privacy-preserving authentication scheme with adaptive key evolution in remote health monitoring system

20. How federal agencies can secure their cloud migrations

21. On the Relations Between Security Notions in Hierarchical Key Assignment Schemes for Dynamic Structures

22. Key Indistinguishability versus Strong Key Indistinguishability for Hierarchical Key Assignment Schemes

23. Dual-key-binding cancelable palmprint cryptosystem for palmprint protection and information security

24. Certificateless strong key-insulated signature without random oracles

25. An improved strong key exposure resilient auditing for cloud storage auditing

26. Authenticated key exchange protocol with enhanced freshness properties

27. Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages

28. Resilience against brute force and rainbow table attacks using strong ICMetrics session key pairs

29. Password-Based Authenticated Key Exchange

30. Secret data communication system using steganography, AES and RSA

31. Certificateless strong key-insulated signature

32. Leakage Resilient Strong Key-Insulated Signatures in Public Channel

33. On Tamper-Resistance from a Theoretical Viewpoint

34. Malleability Attacks on Multi-Party Key Agreement Protocols

35. Strong Key-Insulated Signature Schemes

Catalog

Books, media, physical & digital resources