Search

Your search keyword '"Key generation"' showing total 4,164 results

Search Constraints

Start Over You searched for: Descriptor "Key generation" Remove constraint Descriptor: "Key generation"
4,164 results on '"Key generation"'

Search Results

101. Applications of RSSI Preprocessing in Multi-Domain Wireless Networks: A Survey

102. Computation And Communication Efficient Chinese Remainder Theorem Based Multi-Party Key Generation Using Modified RSA

103. Biometric-Based Seed Extraction Scheme for Multi-quadratic-Based Post-quantum Computing

105. Template Security Using Fuzzy Extractor: A Review

106. Simplified and Secure Session Key Sharing for Internet of Things (IoT) Networks

110. Crytographical primitive for blockchain: a secure random DNA encoded key generation technique.

111. Opposition Based Joint Grey Wolf-Whale Optimization Algorithm Based Attribute Based Encryption in Secure Wireless Communication.

112. Best Fit DNA-Based Cryptographic Keys: The Genetic Algorithm Approach.

113. Dual-Factor WBAN Enhanced Authentication System Based on Iris and ECG Descriptors.

114. A Neighbor Trust Weight Based Cryptography for Multi Key Distribution for Improving Quality of Service in MANETS.

115. Dynamic resource provisioning and secured file sharing using virtualization in cloud azure.

116. A Secured Storage and Communication System for Cloud Using ECC, Polynomial Congruence and DSA.

117. NRTAS: Non-redundant traffic authentication scheme for strengthening privacy in 5 G communication networks.

119. Based on GAN Generating Chaotic Sequence

120. Secrecy Capacity of Symmetric Keys Generated by Quantising Channel Metrics Over a Fading Channel

123. Is It Possible to Hide My Key into Deep Neural Network?

124. Encrypt with Your Mind: Reliable and Revocable Brain Biometrics via Multidimensional Gaussian Fitted Bit Allocation

125. Omega Network Pseudorandom Key Generation Based on DNA Cryptography.

126. Non-Reconciled Physical-Layer Keys-Assisted Secure Communication Scheme Based on Channel Correlation.

127. Decision Tree Based Key Management for Secure Group Communication.

128. A BER-Suppressed PUF With an Amplification of Process Mismatch Effect in an Oscillator Collapse Topology.

129. Semantic key generation based on natural language.

130. Establishing and validating secured keys for IoT devices: using P3 connection model on a cloud-based architecture.

131. Blockchain for Securing Healthcare Data Using Squirrel Search Optimization Algorithm.

132. Fusion-based advanced encryption algorithm for enhancing the security of Big Data in Cloud.

133. Key generation method based on reconfigurable intelligent surface in quasi-static scene

134. Key generation method based on reconfigurable intelligent surface in quasi-static scene

135. Internet of Medical Things with a Blockchain-Assisted Smart Healthcare System Using Metaheuristics with a Deep Learning Model

136. A multi-level random key cryptosystem based on DNA encoding and state-changing mealy machine.

137. On-Line Evaluation and Monitoring of Security Features of an RO-Based PUF/TRNG for IoT Devices

138. Dynamic hyperchaotic key generation using optical orthogonal frequency division multiplexing‐based visible light communication networks.

139. RSA based encryption approach for preserving confidentiality of big data.

140. A fast encryption method for enterprise financial data based on blockchain.

141. Pairing-Free Identity-Based Digital Signature Algorithm for Broadcast Authentication Based on Modified ECC Using Battle Royal Optimization Algorithm.

142. An Efficient Enhanced Full Homomorphic Encryption for Securing Video in Cloud Environment.

143. Data Hiding in 3D-Medical Image.

144. Optimizing Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Networks

145. A Complete End-to-End System for Iris Recognition to Mitigate Replay and Template Attack

146. Implementation and Analysis of Cryptographic Ciphers in FPGA

147. Error Reconciliation with Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Networks

148. A Biometric Key Generation Method for Fingerprint and Finger Vein Fusion

149. A Low Overhead Error Correction Algorithm Using Random Permutation for SRAM PUFs

150. Channel-Based Dynamic Key Generation for Physical Layer Security in OFDM-PON Systems

Catalog

Books, media, physical & digital resources