Works matching Cryptography


Results: 5000
    1
    2
    3
    4
    5
    6
    7
    8
    9
    10

    A Survey about Post Quantum Cryptography Methods.

    Published in:
    EAI Endorsed Transactions on Internet of Things, 2024, v. 10, p. 1, doi. 10.4108/eetiot.5099
    By:
    • J., Jency Rubia;
    • R., Babitha Lincy;
    • Nithila, Ezhil E.;
    • C., Sherin Shibi;
    • A., Rosi
    Publication type:
    Article
    11
    12
    13
    14
    15
    16
    17

    Post Quantum Public and Private Key Cryptography Optimized for IoT Security.

    Published in:
    Wireless Personal Communications, 2023, v. 129, n. 2, p. 893, doi. 10.1007/s11277-022-10162-w
    By:
    • Kaushik, Ajay;
    • Vadlamani, Lakshmi Sai Srikar;
    • Hussain, Mohammed Mohsin;
    • Sahay, Milind;
    • Singh, Rahul;
    • Singh, Ananya Komal;
    • Indu, S.;
    • Goswami, Puneet;
    • Kousik, Nalliyanna Goundar Veerappan
    Publication type:
    Article
    18
    19
    20
    21
    22
    23
    24
    25
    26
    27
    28
    29
    30
    31
    32
    33

    Structure Aware Visual Cryptography.

    Published in:
    Computer Graphics Forum, 2014, v. 33, n. 7, p. 141, doi. 10.1111/cgf.12482
    By:
    • Liu, Bin;
    • Martin, Ralph R.;
    • Huang, Ji‐Wu;
    • Hu, Shi‐Min
    Publication type:
    Article
    34
    35
    36
    37
    38
    39

    VISUAL SYMMETRIC SPEECH CRYPTOGRAPHY.

    Published in:
    International Journal of Advanced Research in Computer Science, 2018, v. 10, n. 5, p. 9, doi. 10.26483/ijarcs.v9i5.6286
    By:
    • Shah, Sanket;
    • Shah, Jainam
    Publication type:
    Article
    40
    41
    42
    43
    44
    45
    46
    47
    48

    Survey on DNA based Cryptography.

    Published in:
    International Journal of Computer Science & Management Studies, 2015, v. 17, n. 1, p. 15
    By:
    • Shweta;
    • Indora, Sanjeev
    Publication type:
    Article
    49
    50