Works matching IS 2410387X AND DT 2023 AND VI 7 AND IP 1
Results: 15
Cybersecurity Test Bed for Smart Contracts.
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 1, p. 15, doi. 10.3390/cryptography7010015
- By:
- Publication type:
- Article
Models for Generation of Proof Forest in zk-SNARK Based Sidechains.
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 1, p. 14, doi. 10.3390/cryptography7010014
- By:
- Publication type:
- Article
A Decentralized COVID-19 Vaccine Tracking System Using Blockchain Technology.
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 1, p. 13, doi. 10.3390/cryptography7010013
- By:
- Publication type:
- Article
Dynamic Multimedia Encryption Using a Parallel File System Based on Multi-Core Processors.
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 1, p. 12, doi. 10.3390/cryptography7010012
- By:
- Publication type:
- Article
Data Sharing Privacy Metrics Model Based on Information Entropy and Group Privacy Preference.
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 1, p. 11, doi. 10.3390/cryptography7010011
- By:
- Publication type:
- Article
Selection Strategy of F4-Style Algorithm to Solve MQ Problems Related to MPKC.
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 1, p. 10, doi. 10.3390/cryptography7010010
- By:
- Publication type:
- Article
Attacking Windows Hello for Business: Is It What We Were Promised?
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 1, p. 9, doi. 10.3390/cryptography7010009
- By:
- Publication type:
- Article
Linear Cryptanalysis of Reduced-Round Simeck Using Super Rounds.
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 1, p. 8, doi. 10.3390/cryptography7010008
- By:
- Publication type:
- Article
Privacy Preserved Video Summarization of Road Traffic Events for IoT Smart Cities.
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 1, p. 7, doi. 10.3390/cryptography7010007
- By:
- Publication type:
- Article
High Throughput PRESENT Cipher Hardware Architecture for the Medical IoT Applications.
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 1, p. 6, doi. 10.3390/cryptography7010006
- By:
- Publication type:
- Article
Quantum Secret Aggregation Utilizing a Network of Agents.
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 1, p. 5, doi. 10.3390/cryptography7010005
- By:
- Publication type:
- Article
Early Detection of Clustered Trojan Attacks on Integrated Circuits Using Transition Delay Fault Model.
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 1, p. 4, doi. 10.3390/cryptography7010004
- By:
- Publication type:
- Article
Acknowledgment to the Reviewers of Cryptography in 2022.
- Published in:
- 2023
- Publication type:
- Editorial
Polar Codes for Module-LWE Public Key Encryption: The Case of Kyber.
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 1, p. 2, doi. 10.3390/cryptography7010002
- By:
- Publication type:
- Article
Authenticated Key Exchange Protocol in the Standard Model under Weaker Assumptions.
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 1, p. 1, doi. 10.3390/cryptography7010001
- By:
- Publication type:
- Article