Works matching Cryptology and Cryptography
1
- Cryptologia, 1999, v. 23, n. 3, p. 261, doi. 10.1080/0161-119991887900
- Article
2
- Ekonomické Listy, 2017, n. 1, p. 39
- Coufal, Jan;
- Tobíšek, Jiří
- Article
3
- Cryptologia, 2014, v. 38, n. 2, p. 133, doi. 10.1080/01611194.2014.885801
- Article
4
- International Journal of Advanced Research in Computer Science, 2011, v. 2, n. 4, p. 147
- Som, Sukalyan;
- Ghosh, Saikat
- Article
5
- IET Intelligent Transport Systems (Wiley-Blackwell), 2020, v. 14, n. 11, p. 1497, doi. 10.1049/iet-its.2019.0833
- Bi, Dexu;
- Kadry, Seifedine;
- Kumar, Priyan Malarvizhi
- Article
6
- Humanitas: International Journal of Social Sciences / Uluslararasi Sosyal Bilimler Dergisi, 2022, v. 10, n. 20, p. 67, doi. 10.20304/humanitas.1130938
- Article
7
- Quantum Information Processing, 2024, v. 23, n. 5, p. 1, doi. 10.1007/s11128-024-04396-9
- Das, Prodipto;
- Biswas, Sumit;
- Kanoo, Sandip
- Article
8
- International Journal of Information Security & Privacy, 2012, v. 6, n. 3, p. 1, doi. 10.4018/jisp.2012070101
- Rwabutaza, Allan;
- Ming Yang;
- Bourbakis, Nikolaos
- Article
9
- Internal Auditor, 2014, v. 71, n. 6, p. 55
- Article
10
- Asian-European Journal of Mathematics, 2022, v. 15, n. 1, p. 1, doi. 10.1142/S1793557122500176
- Ďuriš, Viliam;
- Šumný, Timotej
- Article
11
- Journal Edunity, 2023, v. 2, n. 10, p. 1121
- Article
12
- Computational Intelligence, 2004, v. 20, n. 3, p. 445, doi. 10.1111/j.0824-7935.2004.00244.x
- Isasi, Pedro;
- Hernandez, Julio C.
- Article
13
- IET Information Security (Wiley-Blackwell), 2018, v. 12, n. 5, p. 419, doi. 10.1049/iet-ifs.2017.0196
- Yang, Dong;
- Qi, Wen‐Feng;
- Chen, Hua‐Jin
- Article