Works matching IS 2410387X AND DT 2022 AND VI 6 AND IP 4
Results: 18
Physical Visitor Access Control and Authentication Using Blockchain, Smart Contracts and Internet of Things.
- Published in:
- Cryptography (2410-387X), 2022, v. 6, n. 4, p. 65, doi. 10.3390/cryptography6040065
- By:
- Publication type:
- Article
Privacy Protection Scheme for the Internet of Vehicles Based on Private Set Intersection.
- Published in:
- Cryptography (2410-387X), 2022, v. 6, n. 4, p. 64, doi. 10.3390/cryptography6040064
- By:
- Publication type:
- Article
Formalizing and Safeguarding Blockchain-Based BlockVoke Protocol as an ACME Extension for Fast Certificate Revocation.
- Published in:
- Cryptography (2410-387X), 2022, v. 6, n. 4, p. 63, doi. 10.3390/cryptography6040063
- By:
- Publication type:
- Article
Intrusion Detection System for IoT Using Logical Analysis of Data and Information Gain Ratio.
- Published in:
- Cryptography (2410-387X), 2022, v. 6, n. 4, p. 62, doi. 10.3390/cryptography6040062
- By:
- Publication type:
- Article
Certificateless Searchable Encryption Scheme in Multi-User Environment.
- Published in:
- Cryptography (2410-387X), 2022, v. 6, n. 4, p. 61, doi. 10.3390/cryptography6040061
- By:
- Publication type:
- Article
Reevaluating Graph-Neural-Network-Based Runtime Prediction of SAT-Based Circuit Deobfuscation.
- Published in:
- Cryptography (2410-387X), 2022, v. 6, n. 4, p. 60, doi. 10.3390/cryptography6040060
- By:
- Publication type:
- Article
Shift Register, Reconvergent-Fanout (SiRF) PUF Implementation on an FPGA.
- Published in:
- Cryptography (2410-387X), 2022, v. 6, n. 4, p. 59, doi. 10.3390/cryptography6040059
- By:
- Publication type:
- Article
Process Authentication through Blockchain: Three Case Studies.
- Published in:
- Cryptography (2410-387X), 2022, v. 6, n. 4, p. 58, doi. 10.3390/cryptography6040058
- By:
- Publication type:
- Article
Scaling Ethereum 2.0s Cross-Shard Transactions with Refined Data Structures.
- Published in:
- Cryptography (2410-387X), 2022, v. 6, n. 4, p. 57, doi. 10.3390/cryptography6040057
- By:
- Publication type:
- Article
On Advances of Lattice-Based Cryptographic Schemes and Their Implementations.
- Published in:
- Cryptography (2410-387X), 2022, v. 6, n. 4, p. 56, doi. 10.3390/cryptography6040056
- By:
- Publication type:
- Article
Improving User Privacy in Identity-Based Encryption Environments.
- Published in:
- Cryptography (2410-387X), 2022, v. 6, n. 4, p. 55, doi. 10.3390/cryptography6040055
- By:
- Publication type:
- Article
Privacy-Preserving Contrastive Explanations with Local Foil Trees.
- Published in:
- Cryptography (2410-387X), 2022, v. 6, n. 4, p. 54, doi. 10.3390/cryptography6040054
- By:
- Publication type:
- Article
WPAxFuzz: Sniffing Out Vulnerabilities in Wi-Fi Implementations †.
- Published in:
- Cryptography (2410-387X), 2022, v. 6, n. 4, p. 53, doi. 10.3390/cryptography6040053
- By:
- Publication type:
- Article
ICRP: Internet-Friendly Cryptographic Relay-Detection Protocol.
- Published in:
- Cryptography (2410-387X), 2022, v. 6, n. 4, p. 52, doi. 10.3390/cryptography6040052
- By:
- Publication type:
- Article
Efficient RO-PUF for Generation of Identifiers and Keys in Resource-Constrained Embedded Systems.
- Published in:
- Cryptography (2410-387X), 2022, v. 6, n. 4, p. 51, doi. 10.3390/cryptography6040051
- By:
- Publication type:
- Article
Cryptographic Rational Secret Sharing Schemes over General Networks.
- Published in:
- Cryptography (2410-387X), 2022, v. 6, n. 4, p. 50, doi. 10.3390/cryptography6040050
- By:
- Publication type:
- Article
Blockchain of Resource-Efficient Anonymity Protection with Watermarking for IoT Big Data Market.
- Published in:
- Cryptography (2410-387X), 2022, v. 6, n. 4, p. 49, doi. 10.3390/cryptography6040049
- By:
- Publication type:
- Article
Post Quantum Design in SPDM for Device Authentication and Key Establishment.
- Published in:
- Cryptography (2410-387X), 2022, v. 6, n. 4, p. 48, doi. 10.3390/cryptography6040048
- By:
- Publication type:
- Article