Found: 1875
Select item for more details and to access through your institution.
A Novel DDoS Mitigation Strategy in 5G-Based Vehicular Networks Using Chebyshev Polynomials.
- Published in:
- Arabian Journal for Science & Engineering (Springer Science & Business Media B.V. ), 2024, v. 49, n. 9, p. 11991, doi. 10.1007/s13369-023-08535-9
- By:
- Publication type:
- Article
An Optimized Encryption Storage Scheme for Blockchain Data Based on Cold and Hot Blocks and Threshold Secret Sharing.
- Published in:
- Entropy, 2024, v. 26, n. 8, p. 690, doi. 10.3390/e26080690
- By:
- Publication type:
- Article
IHKM: an improved hierarchical key management scheme for wireless sensor network.
- Published in:
- Telecommunication Systems, 2024, v. 87, n. 1, p. 151, doi. 10.1007/s11235-024-01182-x
- By:
- Publication type:
- Article
Oracles and Signatures.
- Published in:
- UMAP Journal, 2018, v. 39, n. 4, p. 373
- By:
- Publication type:
- Article
Analysis of Key Management Schemes for Secure Group Communication and Their Classification.
- Published in:
- Journal of Computing & Information Technology, 2009, v. 17, n. 2, p. 203, doi. 10.2498/cit.1001215
- By:
- Publication type:
- Article
A Secure Framework for Blockchain Transactions Protection.
- Published in:
- Computer Systems Science & Engineering, 2023, v. 45, n. 2, p. 1095, doi. 10.32604/csse.2023.032862
- By:
- Publication type:
- Article
Pairing-based public-key encryption schemes with backward-and-forward security.
- Published in:
- Computer Systems Science & Engineering, 2008, v. 23, n. 4, p. 303
- By:
- Publication type:
- Article
Pairing-based public-key encryption schemes with backward-and-forward security.
- Published in:
- Computer Systems Science & Engineering, 2008, v. 23, n. 1, p. 3
- By:
- Publication type:
- Article
Fast Track: For many states, mobile driver's licenses are the first step toward a unified digital identity for citizens.
- Published in:
- Government Technology, 2021, v. 34, n. 5, p. 22
- By:
- Publication type:
- Article
A data-aware confidential tunnel for wireless sensor media networks.
- Published in:
- Multimedia Tools & Applications, 2019, v. 78, n. 19, p. 26941, doi. 10.1007/s11042-017-4395-5
- By:
- Publication type:
- Article
Modelling a side channel resistant CHAN-PKC cryptomata for medical data security.
- Published in:
- Multimedia Tools & Applications, 2019, v. 78, n. 18, p. 25977, doi. 10.1007/s11042-019-7730-1
- By:
- Publication type:
- Article
Authenticated public key broadcast encryption with short ciphertexts.
- Published in:
- Multimedia Tools & Applications, 2019, v. 78, n. 16, p. 23399, doi. 10.1007/s11042-019-7598-0
- By:
- Publication type:
- Article
Lattice based signature with outsourced revocation for Multimedia Social Networks in cloud computing.
- Published in:
- Multimedia Tools & Applications, 2019, v. 78, n. 3, p. 3511, doi. 10.1007/s11042-018-6330-9
- By:
- Publication type:
- Article
Face authentication in encrypted domain based on correlation filters.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 13, p. 17043, doi. 10.1007/s11042-017-5275-8
- By:
- Publication type:
- Article
Secure data hiding scheme using shape generation algorithm: a key based approach.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 13, p. 16319, doi. 10.1007/s11042-017-5200-1
- By:
- Publication type:
- Article
An implementation of enhanced public key infrastructure.
- Published in:
- Multimedia Tools & Applications, 2015, v. 74, n. 16, p. 6481, doi. 10.1007/s11042-014-2119-7
- By:
- Publication type:
- Article
A strongly secure pairing-free certificateless authenticated key agreement protocol suitable for smart media and mobile environments.
- Published in:
- Multimedia Tools & Applications, 2015, v. 74, n. 16, p. 6365, doi. 10.1007/s11042-015-2470-3
- By:
- Publication type:
- Article
An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography.
- Published in:
- Multimedia Tools & Applications, 2015, v. 74, n. 5, p. 1711, doi. 10.1007/s11042-014-2283-9
- By:
- Publication type:
- Article
Post-quantum security design for hierarchical healthcare systems based on lattices.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 12, p. 17292, doi. 10.1007/s11227-024-06143-4
- By:
- Publication type:
- Article
CryptoHHO: a bio-inspired cryptosystem for data security in Fog–Cloud architecture.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 11, p. 15834, doi. 10.1007/s11227-024-06055-3
- By:
- Publication type:
- Article
Token open secure and practical NTRU-based updatable encryption.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 10, p. 13499, doi. 10.1007/s11227-024-05962-9
- By:
- Publication type:
- Article
Progress in the prime factorization of large numbers.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 8, p. 11382, doi. 10.1007/s11227-023-05876-y
- By:
- Publication type:
- Article
A Boolean circuit-based revocable ciphertext policy attribute-based encryption scheme.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 8, p. 11762, doi. 10.1007/s11227-023-05867-z
- By:
- Publication type:
- Article
A novel privacy-aware global infrastructure for ecological footprint calculator based on the Internet of things and blockchain.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 7, p. 9494, doi. 10.1007/s11227-023-05821-z
- By:
- Publication type:
- Article
Enhanced authentication security for IoT client nodes through T-ECDSA integrated into MQTT broker.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 7, p. 8898, doi. 10.1007/s11227-023-05789-w
- By:
- Publication type:
- Article
Research on ciphertext speech biohashing authentication based on chaotic system and improved public chain.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 5, p. 6661, doi. 10.1007/s11227-023-05693-3
- By:
- Publication type:
- Article
A blockchain-based provably secure anonymous authentication for edge computing-enabled IoT.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 5, p. 6778, doi. 10.1007/s11227-023-05696-0
- By:
- Publication type:
- Article
Differential fault analysis attack-tolerant hardware implementation of AES.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 4, p. 4648, doi. 10.1007/s11227-023-05632-2
- By:
- Publication type:
- Article
RLWE-based public key searchable encryption: securer, faster, and lower end-to-end delay for cloud computing.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 2, p. 2767, doi. 10.1007/s11227-023-05574-9
- By:
- Publication type:
- Article
E2CSM: efficient FPGA implementation of elliptic curve scalar multiplication over generic prime field GF(p).
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 1, p. 50, doi. 10.1007/s11227-023-05428-4
- By:
- Publication type:
- Article
Verifiable and Boolean keyword searchable attribute-based signcryption for electronic medical record storage and retrieval in cloud computing environment.
- Published in:
- Journal of Supercomputing, 2023, v. 79, n. 18, p. 20324, doi. 10.1007/s11227-023-05416-8
- By:
- Publication type:
- Article
An efficient certificateless group signcryption scheme using Quantum Chebyshev Chaotic Maps in HC-IoT environments.
- Published in:
- Journal of Supercomputing, 2023, v. 79, n. 15, p. 16914, doi. 10.1007/s11227-023-05303-2
- By:
- Publication type:
- Article
A post-quantum key exchange protocol from the intersection of quadric surfaces.
- Published in:
- Journal of Supercomputing, 2023, v. 79, n. 15, p. 16529, doi. 10.1007/s11227-023-05146-x
- By:
- Publication type:
- Article
Constructing conditional PKEET with verification mechanism for data privacy protection in intelligent systems.
- Published in:
- Journal of Supercomputing, 2023, v. 79, n. 13, p. 15004, doi. 10.1007/s11227-023-05253-9
- By:
- Publication type:
- Article
Proactive threshold-proxy re-encryption scheme for secure data sharing on cloud.
- Published in:
- Journal of Supercomputing, 2023, v. 79, n. 13, p. 14117, doi. 10.1007/s11227-023-05221-3
- By:
- Publication type:
- Article
A survey on implementations of homomorphic encryption schemes.
- Published in:
- Journal of Supercomputing, 2023, v. 79, n. 13, p. 15098, doi. 10.1007/s11227-023-05233-z
- By:
- Publication type:
- Article
Adaptively secure CP-ABE for circuits with fan-in n and fan-out 1.
- Published in:
- Journal of Supercomputing, 2023, v. 79, n. 12, p. 13307, doi. 10.1007/s11227-023-05130-5
- By:
- Publication type:
- Article
Flexible multi-client functional encryption for set intersection.
- Published in:
- Journal of Supercomputing, 2023, v. 79, n. 12, p. 13744, doi. 10.1007/s11227-023-05129-y
- By:
- Publication type:
- Article
Secure matrix multiplication based on fully homomorphic encryption.
- Published in:
- Journal of Supercomputing, 2023, v. 79, n. 5, p. 5064, doi. 10.1007/s11227-022-04850-4
- By:
- Publication type:
- Article
PSCLS: provably secure certificateless signature scheme for IoT device on cloud.
- Published in:
- Journal of Supercomputing, 2023, v. 79, n. 5, p. 4962, doi. 10.1007/s11227-022-04795-8
- By:
- Publication type:
- Article
Performance analysis of 5GMAKA: lightweight mutual authentication and key agreement scheme for 5G network.
- Published in:
- Journal of Supercomputing, 2023, v. 79, n. 4, p. 3902, doi. 10.1007/s11227-022-04807-7
- By:
- Publication type:
- Article
A conditional privacy-preserving and desynchronization-resistant authentication protocol for vehicular ad hoc network.
- Published in:
- Journal of Supercomputing, 2022, v. 78, n. 16, p. 17657, doi. 10.1007/s11227-022-04562-9
- By:
- Publication type:
- Article
Blockchain-based mutual authentication protocol without CA.
- Published in:
- Journal of Supercomputing, 2022, v. 78, n. 15, p. 17261, doi. 10.1007/s11227-022-04558-5
- By:
- Publication type:
- Article
Speeding up wheel factoring method.
- Published in:
- Journal of Supercomputing, 2022, v. 78, n. 14, p. 15730, doi. 10.1007/s11227-022-04470-y
- By:
- Publication type:
- Article
A parallel elliptic curve crypto-processor architecture with reduced clock cycle for FPGA platforms.
- Published in:
- Journal of Supercomputing, 2022, v. 78, n. 13, p. 15567, doi. 10.1007/s11227-022-04442-2
- By:
- Publication type:
- Article
DKEMA: GPU-based and dynamic key-dependent efficient message authentication algorithm.
- Published in:
- Journal of Supercomputing, 2022, v. 78, n. 12, p. 14034, doi. 10.1007/s11227-022-04433-3
- By:
- Publication type:
- Article
Provably secure post-quantum authenticated key exchange from supersingular isogenies.
- Published in:
- Journal of Supercomputing, 2022, v. 78, n. 10, p. 12815, doi. 10.1007/s11227-022-04378-7
- By:
- Publication type:
- Article
Design and evaluation of a novel White-box encryption scheme for resource-constrained IoT devices.
- Published in:
- Journal of Supercomputing, 2022, v. 78, n. 8, p. 11111, doi. 10.1007/s11227-022-04322-9
- By:
- Publication type:
- Article
Identity-based public data integrity verification scheme in cloud storage system via blockchain.
- Published in:
- Journal of Supercomputing, 2022, v. 78, n. 6, p. 8509, doi. 10.1007/s11227-021-04193-6
- By:
- Publication type:
- Article
Authentication and key establishment protocol from supersingular isogeny for mobile environments.
- Published in:
- Journal of Supercomputing, 2022, v. 78, n. 5, p. 6371, doi. 10.1007/s11227-021-04121-8
- By:
- Publication type:
- Article