Works matching DE "CRYPTOGRAPHY research"
1
- Scientometrics, 2015, v. 105, n. 1, p. 179, doi. 10.1007/s11192-015-1661-z
- Article
2
- InSight: Rivier Academic Journal, 2012, v. 8, n. 2, p. 1
- Article
3
- IEEE Transactions on Dependable & Secure Computing, 2011, v. 8, n. 5, p. 770, doi. 10.1109/TDSC.2010.44
- Article
4
- Multimedia Tools & Applications, 2018, v. 77, n. 10, p. 12871, doi. 10.1007/s11042-017-4921-5
- Shen, Gang;
- Liu, Feng;
- Fu, Zhengxin;
- Yu, Bin
- Article
5
- Multimedia Tools & Applications, 2016, v. 75, n. 8, p. 4485, doi. 10.1007/s11042-015-2487-7
- Farash, Mohammad;
- Kumari, Saru;
- Bakhtiari, Majid
- Article
6
- Journal of Electronic Imaging, 2014, v. 23, n. 1, p. 1, doi. 10.1117/1.JEI.23.1.013025
- Wenxiang Li;
- Tao Zhang;
- Ran Wang;
- Yan Zhang
- Article
7
- Journal of Electronic Imaging, 2013, v. 22, n. 4, p. 1, doi. 10.1117/1.JEI.22.4.043033
- Ran Wang;
- Xijian Ping;
- Mankun Xu;
- Tao Zhang
- Article
8
- Journal of Electronic Imaging, 2013, v. 22, n. 4, p. 1, doi. 10.1117/1.JEI.22.4.043007
- Fakhredanesh, Mohammad;
- Rahmati, Mohammad;
- Safabakhsh, Reza
- Article
9
- Journal of Electronic Imaging, 2013, v. 22, n. 4, p. 1, doi. 10.1117/1.JEI.22.4.043009
- Qazanfari, Kazem;
- Safabakhsh, Reza
- Article
10
- Journal of Cryptology, 2016, v. 29, n. 2, p. 283, doi. 10.1007/s00145-014-9194-9
- Haitner, Iftach;
- Omri, Eran;
- Zarosim, Hila
- Article
11
- Journal of Cryptology, 2009, v. 22, n. 2, p. 227, doi. 10.1007/s00145-008-9027-9
- Article
12
- Journal of Zhengzhou University of Light Industry, Natural Science Edition, 2014, v. 29, n. 6, p. 73, doi. 10.3969/j.issn.2095-476X.2014.06.016
- Article
13
- ISeCure, 2014, v. 6, n. 2, p. 169
- Shakeri, Ehsan;
- Ghaemmaghami, Shahrokh
- Article
14
- International Journal of Modern Physics C: Computational Physics & Physical Computation, 2009, v. 20, n. 10, p. 1531, doi. 10.1142/S0129183109014576
- Chen, Jia-Hao;
- Lee, Kuo-Chang;
- Hwang, Tzonelih
- Article
15
- Peer-to-Peer Networking & Applications, 2014, v. 7, n. 4, p. 655, doi. 10.1007/s12083-012-0189-8
- Hwang, Ren-Junn;
- Huang, Loang-Shing
- Article
16
- International Journal of Number Theory, 2009, v. 5, n. 2, p. 311, doi. 10.1142/S1793042109002122
- Article
17
- Sensors (14248220), 2016, v. 16, n. 1, p. 37, doi. 10.3390/s16010037
- Shahzad, Aamir;
- Lee, Malrey;
- Suntae Kim;
- Kangmin Kim;
- Jae-Young Choi;
- Younghwa Cho;
- Keun-Kwang Lee
- Article
18
- Sensors (14248220), 2015, v. 15, n. 3, p. 7040, doi. 10.3390/s150307040
- Ishmanov, Farruh;
- Sung Won Kim;
- Seung Yeob Nam
- Article
19
- Sensors (14248220), 2014, v. 14, n. 11, p. 21174, doi. 10.3390/s141121174
- Yonglei Yao;
- Jingfa Liu;
- Xiong, Neal N.
- Article
20
- Sensors (14248220), 2014, v. 14, n. 11, p. 21023, doi. 10.3390/s141121023
- Junghyun Nam;
- Moonseong Kim;
- Juryon Paik;
- Youngsook Lee;
- Dongho Won
- Article
21
- Sensors (14248220), 2014, v. 14, n. 7, p. 11542, doi. 10.3390/s140711542
- Wenchao Liu;
- Zhenhua Zhang;
- Miaoxin Li;
- Zhenglin Liu
- Article
22
- Sensors (14248220), 2014, v. 14, n. 6, p. 10081, doi. 10.3390/s140610081
- Younsung Choi;
- Donghoon Lee;
- Jiye Kim;
- Jaewook Jung;
- Junghyun Nam;
- Dongho Won
- Article
23
- Sensors (14248220), 2011, v. 11, n. 2, p. 1607, doi. 10.3390/s110201607
- Xianfeng Guo;
- Jiashu Zhang;
- Khan, Muhammad Khurram;
- Alghathbar, Khaled
- Article
24
- Issues in Information Systems, 2013, v. 14, n. 2, p. 393
- Article
25
- Ukrainian Scientific Journal of Information Security, 2014, v. 20, n. 3, p. 259, doi. 10.18372/2225-5036.20.7553
- Article
26
- Ukrainian Scientific Journal of Information Security, 2014, v. 20, n. 3, p. 248, doi. 10.18372/2225-5036.20.7551
- Article
27
- Ukrainian Scientific Journal of Information Security, 2014, v. 20, n. 3, p. 242, doi. 10.18372/2225-5036.20.7550
- Rudnytskyy, V.;
- Melnyk, O.;
- Scherbyna, V.;
- Myronyuk, T.
- Article
28
- Ukrainian Scientific Journal of Information Security, 2014, v. 20, n. 2, p. 159, doi. 10.18372/2225-5036.20.7302
- Luzhetskiy, V.;
- Gorbenko, I.
- Article
29
- Ukrainian Scientific Journal of Information Security, 2014, v. 20, n. 2, p. 176, doi. 10.18372/2225-5036.20.7305
- Article
30
- Ukrainian Scientific Journal of Information Security, 2014, v. 20, n. 2, p. 143, doi. 10.18372/2225-5036.20.7299
- Babenko, V.;
- Melnyk, O.;
- Stabetska, T.
- Article
31
- International Journal of Information Security, 2011, v. 10, n. 1, p. 15, doi. 10.1007/s10207-010-0116-z
- Lim, Hoon;
- Paterson, Kenneth
- Article
32
- Computer Journal, 2014, v. 57, n. 10, p. 1570, doi. 10.1093/comjnl/bxt097
- Article
33
- Computer Journal, 2014, v. 57, n. 10, p. 1460, doi. 10.1093/comjnl/bxt069
- López-García, Lourdes;
- Perez, Luis J. Dominguez;
- Rodríguez-Henríquez, Francisco
- Article
34
- Computer Journal, 2014, v. 57, n. 10, p. 1472, doi. 10.1093/comjnl/bxt076
- Cui, Hui;
- Mu, Yi;
- Au, Man Ho
- Article
35
- Serbian Journal of Electrical Engineering, 2016, v. 13, n. 1, p. 21, doi. 10.2298/SJEE1601021T
- Tatović, Milomir;
- Adamović, Saša;
- Milosavljević, Milan
- Article
36
- Complexity, 2015, v. 21, n. 2, p. 154, doi. 10.1002/cplx.21587
- Liu, Lingfeng;
- Hu, Hanping;
- Deng, Yashuang;
- Miao, Suoxia
- Article
37
- Journal of Supercomputing, 2016, v. 72, n. 7, p. 2734, doi. 10.1007/s11227-015-1581-y
- Zhou, Jianhong;
- Ma, Maode;
- Feng, Yong;
- Nguyen, Thuy
- Article
38
- Scientific Research & Education in the Air Force - AFASES, 2014, v. 1, p. 367
- PURA, Mihai Lica;
- PATRICIU, Victor Valeriu
- Article
39
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/7080673
- He, Junhui;
- Chen, Junxi;
- Xiao, Shichang;
- Tang, Shaohua;
- Huang, Xiaoyu
- Article
40
- Security & Communication Networks, 2016, v. 9, n. 11, p. 1340, doi. 10.1002/sec.1420
- Li, Mingchu;
- Xu, Xiaodong;
- Guo, Cheng;
- Tan, Xing
- Article
41
- Security & Communication Networks, 2016, v. 9, n. 11, p. 1353, doi. 10.1002/sec.1421
- Wang, Liangliang;
- Chen, Kefei;
- Long, Yu;
- Wang, Huige
- Article
42
- Security & Communication Networks, 2016, v. 9, n. 11, p. 1417, doi. 10.1002/sec.1429
- Sun, Shi-Feng;
- Gu, Dawu;
- Liu, Shengli
- Article
43
- Security & Communication Networks, 2016, v. 9, n. 10, p. 1119, doi. 10.1002/sec.1404
- Damjanović, Boris;
- Simić, Dejan
- Article
44
- Security & Communication Networks, 2016, v. 9, n. 10, p. 966, doi. 10.1002/sec.1392
- Pang, Liaojun;
- Miao, Deyu;
- Lian, Chunfeng
- Article
45
- Security & Communication Networks, 2016, v. 9, n. 10, p. 996, doi. 10.1002/sec.1394
- Bai, Kunpeng;
- Wu, Chuankun
- Article
46
- Security & Communication Networks, 2016, v. 9, n. 10, p. 1016, doi. 10.1002/sec.1396
- Li, Jiguo;
- Guo, Yuyan;
- Yu, Qihong;
- Lu, Yang;
- Zhang, Yichen
- Article
47
- Security & Communication Networks, 2016, v. 9, n. 10, p. 1226, doi. 10.1002/sec.1399
- Manifavas, Charalampos;
- Hatzivasilis, George;
- Fysarakis, Konstantinos;
- Papaefstathiou, Yannis
- Article
48
- Security & Communication Networks, 2016, v. 9, n. 3, p. 229, doi. 10.1002/sec.539
- Ren, Jian;
- Li, Yun;
- Jiang, Tingting;
- Li, Tongtong
- Article
49
- Security & Communication Networks, 2016, v. 9, n. 3, p. 189, doi. 10.1002/sec.417
- Kim, Kitak;
- Park, Jong Hwan;
- Lee, Dong Hoon
- Article
50
- Security & Communication Networks, 2016, v. 9, n. 1, p. 27, doi. 10.1002/sec.1375
- Sereshgi, Mohammad Hossein Faghihi;
- Dakhilalian, Mohammad;
- Shakiba, Mohsen
- Article