Works matching IS 2410387X AND DT 2022 AND VI 6 AND IP 3
Results: 17
Connected Blockchain Federations for Sharing Electronic Health Records.
- Published in:
- Cryptography (2410-387X), 2022, v. 6, n. 3, p. N.PAG, doi. 10.3390/cryptography6030047
- By:
- Publication type:
- Article
Subliminal Channels in Visual Cryptography.
- Published in:
- Cryptography (2410-387X), 2022, v. 6, n. 3, p. N.PAG, doi. 10.3390/cryptography6030046
- By:
- Publication type:
- Article
Hardware Limitations of Lightweight Cryptographic Designs for IoT in Healthcare.
- Published in:
- Cryptography (2410-387X), 2022, v. 6, n. 3, p. N.PAG, doi. 10.3390/cryptography6030045
- By:
- Publication type:
- Article
Combining Markov and Semi-Markov Modelling for Assessing Availability and Cybersecurity of Cloud and IoT Systems.
- Published in:
- Cryptography (2410-387X), 2022, v. 6, n. 3, p. N.PAG, doi. 10.3390/cryptography6030044
- By:
- Publication type:
- Article
A Security Analysis of Circuit Clock Obfuscation.
- Published in:
- Cryptography (2410-387X), 2022, v. 6, n. 3, p. N.PAG, doi. 10.3390/cryptography6030043
- By:
- Publication type:
- Article
How Hard Is It to Detect Surveillance? A Formal Study of Panopticons and Their Detectability Problem.
- Published in:
- Cryptography (2410-387X), 2022, v. 6, n. 3, p. N.PAG, doi. 10.3390/cryptography6030042
- By:
- Publication type:
- Article
Symmetric Cryptography on RISC-V: Performance Evaluation of Standardized Algorithms.
- Published in:
- Cryptography (2410-387X), 2022, v. 6, n. 3, p. N.PAG, doi. 10.3390/cryptography6030041
- By:
- Publication type:
- Article
Attribute-Based Encryption in Securing Big Data from Post-Quantum Perspective: A Survey.
- Published in:
- Cryptography (2410-387X), 2022, v. 6, n. 3, p. N.PAG, doi. 10.3390/cryptography6030040
- By:
- Publication type:
- Article
Multiverse of HawkNess: A Universally-Composable MPC-Based Hawk Variant.
- Published in:
- Cryptography (2410-387X), 2022, v. 6, n. 3, p. N.PAG, doi. 10.3390/cryptography6030039
- By:
- Publication type:
- Article
Node Monitoring as a Fault Detection Countermeasure against Information Leakage within a RISC-V Microprocessor.
- Published in:
- Cryptography (2410-387X), 2022, v. 6, n. 3, p. N.PAG, doi. 10.3390/cryptography6030038
- By:
- Publication type:
- Article
Light Weight Authentication Scheme for Smart Home IoT Devices.
- Published in:
- Cryptography (2410-387X), 2022, v. 6, n. 3, p. N.PAG, doi. 10.3390/cryptography6030037
- By:
- Publication type:
- Article
Multi-Wavelength Quantum Key Distribution Emulation with Physical Unclonable Function.
- Published in:
- Cryptography (2410-387X), 2022, v. 6, n. 3, p. N.PAG, doi. 10.3390/cryptography6030036
- By:
- Publication type:
- Article
Physical Layer Security Design for Polar Code Construction.
- Published in:
- Cryptography (2410-387X), 2022, v. 6, n. 3, p. N.PAG, doi. 10.3390/cryptography6030035
- By:
- Publication type:
- Article
BFV-Based Homomorphic Encryption for Privacy-Preserving CNN Models.
- Published in:
- Cryptography (2410-387X), 2022, v. 6, n. 3, p. N.PAG, doi. 10.3390/cryptography6030034
- By:
- Publication type:
- Article
A Batch Processing Technique for Wearable Health Crowd-Sensing in the Internet of Things.
- Published in:
- Cryptography (2410-387X), 2022, v. 6, n. 3, p. N.PAG, doi. 10.3390/cryptography6030033
- By:
- Publication type:
- Article
Adaptable Cryptographic Primitives in Blockchains via Smart Contracts.
- Published in:
- Cryptography (2410-387X), 2022, v. 6, n. 3, p. N.PAG, doi. 10.3390/cryptography6030032
- By:
- Publication type:
- Article
Side-Channel Attacks on Masked Bitsliced Implementations of AES.
- Published in:
- Cryptography (2410-387X), 2022, v. 6, n. 3, p. N.PAG, doi. 10.3390/cryptography6030031
- By:
- Publication type:
- Article