Found: 6
Select item for more details and to access through your institution.
Authentication and key distribution protocol based on Diffie-Hellman algorithm and physically unclonable functions.
- Published in:
- Telkomnika, 2024, v. 22, n. 2, p. 290, doi. 10.12928/TELKOMNIKA.v22i2.25705
- By:
- Publication type:
- Article
Enhancing cryptographic protection, authentication, and authorization in cellular networks: a comprehensive research study.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2024, v. 14, n. 1, p. 479, doi. 10.11591/ijece.v14i1.pp479-487
- By:
- Publication type:
- Article
Fault-tolerant backup storage system for confidential data in distributed servers.
- Published in:
- Telkomnika, 2023, v. 21, n. 5, p. 1030, doi. 10.12928/TELKOMNIKA.v21i5.25305
- By:
- Publication type:
- Article
MODELING OF A DIGITAL COMMUNICATION SYSTEM WITH INTERFERENCE-RESISTANT CODING OVER DELAYED MULTIPATH CHANNELS FOR A FIXED WIRELESS ACCESS SYSTEM.
- Published in:
- Scientific Journal of Astana IT University, 2023, v. 14, p. 5, doi. 10.37943/14IFNS2422
- By:
- Publication type:
- Article
On some methods of storing data in the cloud for a given time.
- Published in:
- Telkomnika, 2022, v. 20, n. 2, p. 366, doi. 10.12928/TELKOMNIKA.v20i2.21887
- By:
- Publication type:
- Article
New methods of secure outsourcing of scientific computations.
- Published in:
- Journal of Supercomputing, 2013, v. 65, n. 1, p. 469, doi. 10.1007/s11227-012-0809-3
- By:
- Publication type:
- Article