Found: 1898
Select item for more details and to access through your institution.
A new application to cryptology using generalized Jacobsthal matrices, inner product and self-adjoint operator.
- Published in:
- Discrete Mathematics, Algorithms & Applications, 2024, v. 16, n. 8, p. 1, doi. 10.1142/S1793830923501136
- By:
- Publication type:
- Article
Electronic Commerce and Business-to-Consumer (B2C).
- Published in:
- Journal of Electronic Commerce in Organizations, 2008, v. 6, n. 4, p. 1, doi. 10.4018/jeco.2008100101
- By:
- Publication type:
- Article
E-Commerce Adoption Barriers in Small Businesses and the Differential Effects of Gender.
- Published in:
- Journal of Electronic Commerce in Organizations, 2006, v. 4, n. 2, p. 1, doi. 10.4018/jeco.2006040101
- By:
- Publication type:
- Article
An efficient anonymous remote attestation scheme for trusted computing based on improved CPK.
- Published in:
- Electronic Commerce Research, 2019, v. 19, n. 3, p. 689, doi. 10.1007/s10660-019-09366-3
- By:
- Publication type:
- Article
Odd-even discrimination-based reversible data hiding technique in encrypted images.
- Published in:
- Journal of Electronic Imaging, 2023, v. 32, n. 1, p. 13032, doi. 10.1117/1.JEI.32.1.013032
- By:
- Publication type:
- Article
Image privacy scheme using quantum spinning and rotation.
- Published in:
- Journal of Electronic Imaging, 2018, v. 27, n. 6, p. 1, doi. 10.1117/1.JEI.27.6.063022
- By:
- Publication type:
- Article
A Privacy-Preserving Scheme for Medical Diagnosis Records Based on Encrypted Image Steganography.
- Published in:
- Zambia ICT Journal, 2023, v. 7, n. 1, p. 23, doi. 10.33260/zictjournal.v7i1.151
- By:
- Publication type:
- Article
CRYPTOGRAPHY UTILIZING THE AFFINE-HILL CIPHER AND EXTENDED GENERALIZED FIBONACCI MATRICES.
- Published in:
- Electronic Journal of Mathematical Analysis & Applications, 2023, v. 11, n. 2, p. 1, doi. 10.21608/ejmaa.2023.295792
- By:
- Publication type:
- Article
Demystifying Quantum.
- Published in:
- ISACA Journal, 2024, n. 6, p. 47
- By:
- Publication type:
- Article
The Encrypted Truth is Already Out There.
- Published in:
- ISACA Journal, 2024, n. 6, p. 18
- By:
- Publication type:
- Article
Rethinking Cybernetics.
- Published in:
- ISACA Journal, 2024, n. 2, p. 45
- By:
- Publication type:
- Article
Making and Breaking Data Security With Quantum Machines.
- Published in:
- ISACA Journal, 2022, n. 4, p. 22
- By:
- Publication type:
- Article
Optimization of optical fiber parameters to reduce errors of quantum key distribution using entangled polarization states of biphotons.
- Published in:
- Optics & Spectroscopy, 2012, v. 112, n. 3, p. 327, doi. 10.1134/S0030400X12030137
- By:
- Publication type:
- Article
Quantum key distribution with time coding on linearly dependent states.
- Published in:
- Optics & Spectroscopy, 2012, v. 112, n. 3, p. 335, doi. 10.1134/S0030400X12030101
- By:
- Publication type:
- Article
ПРОЕКТУВАННЯ ЗАХИСНИХ СИСТЕМ НА БАЗІ ФРАКТАЛЬНИХ АЛГОРИТМІВ.
- Published in:
- Automation of Technological & Business Processes / Avtomatizaciâ Tehnologiceskih i Biznes-Processov, 2021, v. 13, n. 2, p. 41
- By:
- Publication type:
- Article
АНАЛІЗ КОМПЛЕКСНОЇ МОДЕЛІ КРИПТОСИСТЕМИ ДЛЯ ЗАХИСТУ КОНФІДЕНЦІЙНИХ ДАНИХ В КОМП'ЮТЕР.
- Published in:
- Automation of Technological & Business Processes / Avtomatizaciâ Tehnologiceskih i Biznes-Processov, 2020, v. 12, n. 2, p. 41, doi. 10.15673/atbp.v12i2.1808
- By:
- Publication type:
- Article
MoTE-ECC Based Encryption on MSP430.
- Published in:
- Journal of Information & Communication Convergence Engineering, 2017, v. 15, n. 3, p. 160, doi. 10.6109/jicce.2017.15.3.160
- By:
- Publication type:
- Article
이진 에드워즈 곡선 공개키 암호를 위한 혼합 ω-좌표계 기반의 점 스칼라 곱셈기.
- Published in:
- Journal of the Korea Institute of Information & Communication Engineering, 2023, v. 27, n. 6, p. 752, doi. 10.6109/jkiice.2023.27.6.752
- By:
- Publication type:
- Article
A Secure and High Capacity Image Steganography Approach Using Huffman Coding and RSA Encryption.
- Published in:
- Journal of Qadisiyah Computer Science & Mathematics, 2023, v. 15, n. 2, p. 1, doi. 10.29304/jqcm.2023.15.2.1231
- By:
- Publication type:
- Article
SECURE RSA CRYPTOSYSTEM BASED ON MULTIPLE KEYS.
- Published in:
- Journal of Qadisiyah Computer Science & Mathematics, 2021, v. 13, n. 3, p. 25, doi. 10.29304/jqcm.2021.13.3.824
- By:
- Publication type:
- Article
基 于 二 型 模 糊 集 理 论 的 应 急 设 施 选 址 方 法.
- Published in:
- Journal of Dalian University of Technology / Dalian Ligong Daxue Xuebao, 2020, v. 60, n. 6, p. 654, doi. 10.7511/dllgxb202006014
- By:
- Publication type:
- Article
A new quantum-safe multivariate polynomial public key digital signature algorithm.
- Published in:
- Scientific Reports, 2022, v. 12, n. 1, p. 1, doi. 10.1038/s41598-022-15843-x
- By:
- Publication type:
- Article
A dynamic AES cryptosystem based on memristive neural network.
- Published in:
- Scientific Reports, 2022, v. 12, n. 1, p. 1, doi. 10.1038/s41598-022-13286-y
- By:
- Publication type:
- Article
Quantum blockchain based on asymmetric quantum encryption and a stake vote consensus algorithm.
- Published in:
- Scientific Reports, 2022, v. 12, n. 1, p. 1, doi. 10.1038/s41598-022-12412-0
- By:
- Publication type:
- Article
PRIVACY PRESERVING DATA ACCESS CONTROL USING PUBLIC KEY ENCRYPTION IN CLOUD.
- Published in:
- International Journal on Information Sciences & Computing, 2015, v. 9, n. 1, p. 1, doi. 10.18000/ijisac.50149
- By:
- Publication type:
- Article
IDENTITY-BASED CHRYPTOGRAPHY: FROM PROPOSALS TO EVERYDAY USE.
- Published in:
- Scientific Research & Education in the Air Force - AFASES, 2014, v. 1, p. 367
- By:
- Publication type:
- Article
An Inexpensive Device for Teaching Public Key Encryption.
- Published in:
- Journal of Information Systems Education, 2009, v. 20, n. 3, p. 277
- By:
- Publication type:
- Article
Meta-optics empowered vector visual cryptography for high security and rapid decryption.
- Published in:
- Nature Communications, 2023, v. 14, n. 1, p. 1, doi. 10.1038/s41467-023-37510-z
- By:
- Publication type:
- Article
The effect of COVID certificates on vaccine uptake, health outcomes, and the economy.
- Published in:
- Nature Communications, 2022, v. 13, n. 1, p. 1, doi. 10.1038/s41467-022-31394-1
- By:
- Publication type:
- Article
Crescimento e atividade enzimática de plântulas de girassol sob estresse hídrico cultivadas com resíduo industrial em diferentes granulometrias.
- Published in:
- Revista Verde de Agroecologia e Desenvolvimento Sustentável, 2021, v. 16, n. 4, p. 358, doi. 10.18378/rvads.v16i4.9007
- By:
- Publication type:
- Article
A Survey on Public-Key and Identity-Based Encryption Scheme with Equality Testing over Encrypted Data in Cloud Computing.
- Published in:
- Journal of Algebraic Statistics, 2022, v. 13, n. 2, p. 2129
- By:
- Publication type:
- Article
Efficient and Secured Data Lookup Protocol using Public-Key and Digital Signature Authentication in RC-Based Hierarchical Structured P2P Network.
- Published in:
- International Journal for Computers & Their Applications, 2023, v. 30, n. 2, p. 140
- By:
- Publication type:
- Article
ELEKTRONSKA KUPOVINA POSREDSTVOM APLIKACIJE ZA MOBILNU PLATFORMU.
- Published in:
- Singidunum Scientific Review / Singidunum Revija, 2010, v. 7, n. 1, p. 134
- By:
- Publication type:
- Article
The power-generalized k-Horadam sequences in different modules and a new cryptographic method with these sequences.
- Published in:
- Discrete Mathematics, Algorithms & Applications, 2024, v. 16, n. 5, p. 1, doi. 10.1142/S1793830923500556
- By:
- Publication type:
- Article
An applications of signed quadratic residues in public key cryptography.
- Published in:
- Discrete Mathematics, Algorithms & Applications, 2018, v. 10, n. 6, p. N.PAG, doi. 10.1142/S1793830918500817
- By:
- Publication type:
- Article
A new certificateless multiple key agreement scheme.
- Published in:
- Discrete Mathematics, Algorithms & Applications, 2017, v. 9, n. 1, p. -1, doi. 10.1142/S1793830917500021
- By:
- Publication type:
- Article
ABSOLUTELY SECURE MESSAGE TRANSMISSION USING A KEY SHARING GRAPH.
- Published in:
- Discrete Mathematics, Algorithms & Applications, 2012, v. 4, n. 4, p. -1, doi. 10.1142/S179383091250053X
- By:
- Publication type:
- Article
LSKA-ID: A lightweight security and key agreement protocol based on an identity for vehicular communication.
- Published in:
- Telkomnika, 2023, v. 21, n. 4, p. 784, doi. 10.12928/TELKOMNIKA.v21i4.24388
- By:
- Publication type:
- Article
A comparison of different support vector machine kernels for artificial speech detection.
- Published in:
- Telkomnika, 2023, v. 21, n. 1, p. 97, doi. 10.12928/TELKOMNIKA.v21i1.24259
- By:
- Publication type:
- Article
Enhancement process of AES: a lightweight cryptography algorithm-AES for constrained devices.
- Published in:
- Telkomnika, 2022, v. 20, n. 3, p. 551, doi. 10.12928/TELKOMNIKA.v20i3.23297
- By:
- Publication type:
- Article
Multi-Domain Authentication Protocol Based on Dual-Signature.
- Published in:
- Telkomnika, 2015, v. 13, n. 1, p. 290, doi. 10.12928/TELKOMNIKA.v13i1.1164
- By:
- Publication type:
- Article
FPGA Implementation for Elliptic Curve Cryptography Algorithm and Circuit with High Efficiency and Low Delay for IoT Applications.
- Published in:
- Micromachines, 2023, v. 14, n. 5, p. 1037, doi. 10.3390/mi14051037
- By:
- Publication type:
- Article
Data and Service Security of GNSS Sensors Integrated with Cryptographic Module.
- Published in:
- Micromachines, 2023, v. 14, n. 2, p. 454, doi. 10.3390/mi14020454
- By:
- Publication type:
- Article
SCA-Safe Implementation of Modified SaMAL2R Algorithm in FPGA.
- Published in:
- Micromachines, 2022, v. 13, n. 11, p. 1872, doi. 10.3390/mi13111872
- By:
- Publication type:
- Article
A Privacy-Preserving Scheme for Managing Secure Data in Healthcare System.
- Published in:
- Iraqi Journal for Electrical & Electronic Engineering, 2023, v. 19, n. 2, p. 70, doi. 10.37917/ijeee.19.2.9
- By:
- Publication type:
- Article
Secure Multi-keyword Similarity Search Over Encrypted Data With Security Improvement.
- Published in:
- Iraqi Journal for Electrical & Electronic Engineering, 2021, v. 17, n. 2, p. 1, doi. 10.37917/ijeee.17.2.1
- By:
- Publication type:
- Article
Emergence of Novel WEDEx-Kerberotic Cryptographic Framework to Strengthen the Cloud Data Security against Malicious Attacks.
- Published in:
- Symmetry (20738994), 2024, v. 16, n. 5, p. 605, doi. 10.3390/sym16050605
- By:
- Publication type:
- Article
Asymmetric Cryptography Based on the Tropical Jones Matrix.
- Published in:
- Symmetry (20738994), 2024, v. 16, n. 4, p. 456, doi. 10.3390/sym16040456
- By:
- Publication type:
- Article
An Improved Public Key Cryptographic Algorithm Based on Chebyshev Polynomials and RSA.
- Published in:
- Symmetry (20738994), 2024, v. 16, n. 3, p. 263, doi. 10.3390/sym16030263
- By:
- Publication type:
- Article
Lightweight Computational Complexity Stepping Up the NTRU Post-Quantum Algorithm Using Parallel Computing.
- Published in:
- Symmetry (20738994), 2024, v. 16, n. 1, p. 12, doi. 10.3390/sym16010012
- By:
- Publication type:
- Article