Works matching DE "PUBLIC key cryptography"
Results: 1953
Internet Law: Latest Developments in Cyber Laws in Malaysia.
- Published in:
- International Journal of Legal Information, 2012, v. 40, n. 1/2, p. 257, doi. 10.1017/S0731126500006491
- By:
- Publication type:
- Article
10 Minutes with a Quantum Cryptography Expert.
- Published in:
- 2010
- Publication type:
- Interview
Practical Data Transmission Scheme for Wireless Sensor Networks in Heterogeneous IoT Environment.
- Published in:
- Wireless Personal Communications, 2019, v. 109, n. 1, p. 505, doi. 10.1007/s11277-019-06576-8
- By:
- Publication type:
- Article
Security against Attacks and Malicious Code Execution in Mobile Agent Using IBF-CPABE Protocol.
- Published in:
- Wireless Personal Communications, 2019, v. 107, n. 2, p. 1155, doi. 10.1007/s11277-019-06329-7
- By:
- Publication type:
- Article
Towards Wearability in Cryptographic Systems: A Novel Architecture Based on Rainbow Scheme for Wearable Devices.
- Published in:
- Wireless Personal Communications, 2018, v. 102, n. 2, p. 1471, doi. 10.1007/s11277-017-5206-z
- By:
- Publication type:
- Article
An Authentication Key Establish Protocol for WSNs Based on Combined Key.
- Published in:
- Wireless Personal Communications, 2018, v. 99, n. 1, p. 95, doi. 10.1007/s11277-017-5040-3
- By:
- Publication type:
- Article
Cryptanalysis and Improvement of an RSA Based Remote User Authentication Scheme Using Smart Card.
- Published in:
- Wireless Personal Communications, 2017, v. 96, n. 3, p. 4629, doi. 10.1007/s11277-017-4408-8
- By:
- Publication type:
- Article
A New Self-Certified Signature Scheme Based on NTRUS ing for Smart Mobile Communications.
- Published in:
- Wireless Personal Communications, 2017, v. 96, n. 3, p. 4263, doi. 10.1007/s11277-017-4385-y
- By:
- Publication type:
- Article
Low Cost RFID Security Protocol Based on Rabin Symmetric Encryption Algorithm.
- Published in:
- Wireless Personal Communications, 2017, v. 96, n. 1, p. 683, doi. 10.1007/s11277-017-4196-1
- By:
- Publication type:
- Article
Efficient Chosen-Ciphertext Secure Encryption from R-LWE.
- Published in:
- Wireless Personal Communications, 2017, v. 95, n. 3, p. 2973, doi. 10.1007/s11277-017-3979-8
- By:
- Publication type:
- Article
A Key-Insulated Ciphertext Policy Attribute Based Signcryption for Mobile Networks.
- Published in:
- Wireless Personal Communications, 2017, v. 95, n. 2, p. 1215, doi. 10.1007/s11277-016-3825-4
- By:
- Publication type:
- Article
Public Key Cryptosystem Based on Low Density Lattice Codes.
- Published in:
- Wireless Personal Communications, 2017, v. 92, n. 3, p. 1107, doi. 10.1007/s11277-016-3596-y
- By:
- Publication type:
- Article
Practical Signcryption for Secure Communication of Wireless Sensor Networks.
- Published in:
- Wireless Personal Communications, 2016, v. 89, n. 4, p. 1391, doi. 10.1007/s11277-016-3327-4
- By:
- Publication type:
- Article
Provably secure one-round certificateless authenticated group key agreement protocol for secure communications.
- Published in:
- Wireless Personal Communications, 2015, v. 85, n. 3, p. 879, doi. 10.1007/s11277-015-2815-2
- By:
- Publication type:
- Article
An Improved Two-Party Authentication Key Exchange Protocol for Mobile Environment.
- Published in:
- Wireless Personal Communications, 2015, v. 85, n. 3, p. 1399, doi. 10.1007/s11277-015-2847-7
- By:
- Publication type:
- Article
An Efficient Hybrid Cryptographic Algorithm, Consuming Less Time for Exchanging Information in Wireless Sensor Networks.
- Published in:
- Wireless Personal Communications, 2015, v. 85, n. 2, p. 449, doi. 10.1007/s11277-015-2748-9
- By:
- Publication type:
- Article
An Efficient Pairwise and Group Key Management Protocol for Wireless Sensor Network.
- Published in:
- Wireless Personal Communications, 2015, v. 84, n. 3, p. 2035, doi. 10.1007/s11277-015-2546-4
- By:
- Publication type:
- Article
Secret Key Cryptosystem Based on Non-systematic Polar Codes.
- Published in:
- Wireless Personal Communications, 2015, v. 84, n. 2, p. 1345, doi. 10.1007/s11277-015-2691-9
- By:
- Publication type:
- Article
Pairing-Free Certificateless Ring Signcryption (PF-CLRSC) Scheme for Wireless Sensor Networks.
- Published in:
- Wireless Personal Communications, 2015, v. 84, n. 2, p. 1469, doi. 10.1007/s11277-015-2698-2
- By:
- Publication type:
- Article
Enhanced Privacy and Authentication: An Efficient and Secure Anonymous Communication for Location Based Service Using Asymmetric Cryptography Scheme.
- Published in:
- Wireless Personal Communications, 2015, v. 84, n. 2, p. 1487, doi. 10.1007/s11277-015-2699-1
- By:
- Publication type:
- Article
A Novel Remote User Authentication Scheme from Bilinear Pairings Via Internet.
- Published in:
- Wireless Personal Communications, 2015, v. 83, n. 1, p. 163, doi. 10.1007/s11277-015-2386-2
- By:
- Publication type:
- Article
A Pairing Free Anonymous Certificateless Group Key Agreement Protocol for Dynamic Group.
- Published in:
- Wireless Personal Communications, 2015, v. 82, n. 2, p. 1027, doi. 10.1007/s11277-014-2264-3
- By:
- Publication type:
- Article
An Authentication and Key Agreement Mechanism for Multi-domain Wireless Networks Using Certificateless Public-Key Cryptography.
- Published in:
- Wireless Personal Communications, 2015, v. 81, n. 2, p. 779, doi. 10.1007/s11277-014-2157-5
- By:
- Publication type:
- Article
Certificateless Hybrid Signcryption Scheme for Secure Communication of Wireless Sensor Networks.
- Published in:
- Wireless Personal Communications, 2015, v. 80, n. 3, p. 1049, doi. 10.1007/s11277-014-2070-y
- By:
- Publication type:
- Article
A Provably Secure ID-Based Mutual Authentication and Key Agreement Scheme for Mobile Multi-Server Environment Without ESL Attack.
- Published in:
- Wireless Personal Communications, 2014, v. 79, n. 3, p. 1975, doi. 10.1007/s11277-014-1968-8
- By:
- Publication type:
- Article
Rumor Riding: An Anonymity Approach for Decentralized Peer to Peer Systems.
- Published in:
- Wireless Personal Communications, 2014, v. 79, n. 1, p. 647, doi. 10.1007/s11277-014-1878-9
- By:
- Publication type:
- Article
DSBS: A Novel Dependable Secure Broadcast Stream over Lossy Channels.
- Published in:
- Wireless Personal Communications, 2014, v. 78, n. 1, p. 599, doi. 10.1007/s11277-014-1773-4
- By:
- Publication type:
- Article
Autonomic Group Key Management in Deep Space DTN.
- Published in:
- Wireless Personal Communications, 2014, v. 77, n. 1, p. 269, doi. 10.1007/s11277-013-1505-1
- By:
- Publication type:
- Article
Provably Secure Mutual Authentication and Key Exchange Scheme for Expeditious Mobile Communication Through Synchronously One-Time Secrets.
- Published in:
- Wireless Personal Communications, 2014, v. 77, n. 1, p. 197, doi. 10.1007/s11277-013-1501-5
- By:
- Publication type:
- Article
Efficient Linear Homomorphic Encryption from LWE Over Rings.
- Published in:
- Wireless Personal Communications, 2014, v. 74, n. 2, p. 1005, doi. 10.1007/s11277-013-1335-1
- By:
- Publication type:
- Article
A Novel Approach for Physical Layer Cryptography in Wireless Networks.
- Published in:
- Wireless Personal Communications, 2010, v. 53, n. 3, p. 329, doi. 10.1007/s11277-010-9950-6
- By:
- Publication type:
- Article
Feebly secure cryptographic primitives.
- Published in:
- Journal of Mathematical Sciences, 2013, v. 188, n. 1, p. 17, doi. 10.1007/s10958-012-1103-x
- By:
- Publication type:
- Article
Public-key cryptographic system based on generalized satisfiability problem.
- Published in:
- Journal of Mathematical Sciences, 2011, v. 172, n. 5, p. 751, doi. 10.1007/s10958-011-0217-x
- By:
- Publication type:
- Article
Certificate-Based Key Replacement in Single Use Hash-Based Signatures: A Post-Quantum Technique.
- Published in:
- International Journal of High School Research, 2023, v. 5, n. 4, p. 74, doi. 10.36838/v5i4.14
- By:
- Publication type:
- Article
GF(2<sup>m</sup>) 域双参数 ECDSA 算法优化设计.
- Published in:
- Electronic Science & Technology, 2023, v. 36, n. 9, p. 73, doi. 10.16180/j.cnki.issn1007-7820.2023.09.011
- By:
- Publication type:
- Article
改进的蒙哥马利模乘算法及FPGA实现.
- Published in:
- Electronic Science & Technology, 2022, v. 35, n. 7, p. 58, doi. 10.16180/j.cnki.issn1007-7820.2022.07.010
- By:
- Publication type:
- Article
MESSAGE PASSING USING CRYPTOGRAPHY AND STEGANOGRAPHY.
- Published in:
- i-Manager's Journal On Cloud Computing, 2021, v. 8, n. 1, p. 8, doi. 10.26634/jcc.8.1.18455
- By:
- Publication type:
- Article
Cifrado extremo a extremo de WhatsApp.
- Published in:
- Gaceta de la Real Sociedad Matemática Española, 2023, v. 26, n. 2, p. 299
- By:
- Publication type:
- Article
Fitting a Square Peg in a Round Hole.
- Published in:
- Brooklyn Law Review, 2015, v. 80, n. 2, p. 435
- By:
- Publication type:
- Article
A technique to reduce memory usage of M4GB algorithm.
- Published in:
- JSIAM Letters (Online), 2023, v. 15, p. 125, doi. 10.14495/jsiaml.15.125
- By:
- Publication type:
- Article
Development of hybrid approach for solving MQ problem: Intermediate hybrid approach.
- Published in:
- JSIAM Letters (Online), 2023, v. 15, p. 109, doi. 10.14495/jsiaml.15.109
- By:
- Publication type:
- Article
A Survey on Cryptography.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2,Part 4, p. 3633
- By:
- Publication type:
- Article
A Quantum Approach for Text based Steganography.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 1, Part 1, p. 576
- By:
- Publication type:
- Article
Data Security Architecture in Cloud Computing based on Elliptic Curve Cryptography with Special Focus on Lowering the Cipher Space.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 1, Part 1, p. 417
- By:
- Publication type:
- Article
Security Techniques in Cloud Computing for Cloud Data Storage.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2023, v. 9, n. 1, p. 622
- By:
- Publication type:
- Article
Blockchain based Privacy Preserving Student's Certificate Storage, Distribution and Verification.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2023, v. 9, n. 1, p. 245
- By:
- Publication type:
- Article
Lightweight Cryptographic Key Communication Technique in Wireless Network based on Hyperelliptic Cryptosystem (HECC).
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2021, v. 7, n. 2, p. 99
- By:
- Publication type:
- Article
CBEET: Constructing Certificate-based Encryption with Equality Test in the CB-PKS.
- Published in:
- Information Technology & Control, 2023, v. 52, n. 4, p. 935, doi. 10.5755/j01.itc.52.4.33765
- By:
- Publication type:
- Article
Revocable Certificateless Public Key Encryption with Equality Test.
- Published in:
- Information Technology & Control, 2022, v. 51, n. 4, p. 638, doi. 10.5755/j01.itc.51.4.30691
- By:
- Publication type:
- Article
A Novel CCA-Secure Verifiable Authenticated Encryption Scheme Using BSDH and q-SDH Assumptions.
- Published in:
- Information Technology & Control, 2019, v. 48, n. 4, p. 579, doi. 10.5755/j01.itc.48.4.23454
- By:
- Publication type:
- Article