Works matching IS 2410387X AND DT 2024 AND VI 8 AND IP 2
Results: 15
"Whispers from the Wrist": Wearable Health Monitoring Devices and Privacy Regulations in the U.S.: The Loopholes, the Challenges, and the Opportunities.
- Published in:
- Cryptography (2410-387X), 2024, v. 8, n. 2, p. 26, doi. 10.3390/cryptography8020026
- By:
- Publication type:
- Article
A Survey on Complexity Measures for Pseudo-Random Sequences.
- Published in:
- Cryptography (2410-387X), 2024, v. 8, n. 2, p. 25, doi. 10.3390/cryptography8020025
- By:
- Publication type:
- Article
The Security Evaluation of an Efficient Lightweight AES Accelerator †.
- Published in:
- Cryptography (2410-387X), 2024, v. 8, n. 2, p. 24, doi. 10.3390/cryptography8020024
- By:
- Publication type:
- Article
Securing Data Exchange with Elliptic Curve Cryptography: A Novel Hash-Based Method for Message Mapping and Integrity Assurance.
- Published in:
- Cryptography (2410-387X), 2024, v. 8, n. 2, p. 23, doi. 10.3390/cryptography8020023
- By:
- Publication type:
- Article
Defence against Side-Channel Attacks for Encrypted Network Communication Using Multiple Paths.
- Published in:
- Cryptography (2410-387X), 2024, v. 8, n. 2, p. 22, doi. 10.3390/cryptography8020022
- By:
- Publication type:
- Article
Constrained Device Performance Benchmarking with the Implementation of Post-Quantum Cryptography.
- Published in:
- Cryptography (2410-387X), 2024, v. 8, n. 2, p. 21, doi. 10.3390/cryptography8020021
- By:
- Publication type:
- Article
A Provably Secure Anonymous Authentication Protocol for Consumer and Service Provider Information Transmissions in Smart Grids.
- Published in:
- Cryptography (2410-387X), 2024, v. 8, n. 2, p. 20, doi. 10.3390/cryptography8020020
- By:
- Publication type:
- Article
Auditable Anonymous Electronic Examination.
- Published in:
- Cryptography (2410-387X), 2024, v. 8, n. 2, p. 19, doi. 10.3390/cryptography8020019
- By:
- Publication type:
- Article
An Efficient Homomorphic Argmax Approximation for Privacy-Preserving Neural Networks.
- Published in:
- Cryptography (2410-387X), 2024, v. 8, n. 2, p. 18, doi. 10.3390/cryptography8020018
- By:
- Publication type:
- Article
Enhancing Smart Communication Security: A Novel Cost Function for Efficient S-Box Generation in Symmetric Key Cryptography.
- Published in:
- Cryptography (2410-387X), 2024, v. 8, n. 2, p. 17, doi. 10.3390/cryptography8020017
- By:
- Publication type:
- Article
An Engineered Minimal-Set Stimulus for Periodic Information Leakage Fault Detection on a RISC-V Microprocessor.
- Published in:
- Cryptography (2410-387X), 2024, v. 8, n. 2, p. 16, doi. 10.3390/cryptography8020016
- By:
- Publication type:
- Article
Investigating CRYSTALS-Kyber Vulnerabilities: Attack Analysis and Mitigation.
- Published in:
- Cryptography (2410-387X), 2024, v. 8, n. 2, p. 15, doi. 10.3390/cryptography8020015
- By:
- Publication type:
- Article
Analysis of Biometric-Based Cryptographic Key Exchange Protocols—BAKE and BRAKE.
- Published in:
- Cryptography (2410-387X), 2024, v. 8, n. 2, p. 14, doi. 10.3390/cryptography8020014
- By:
- Publication type:
- Article
Detour-RS: Reroute Attack Vulnerability Assessment with Awareness of the Layout and Resource †.
- Published in:
- Cryptography (2410-387X), 2024, v. 8, n. 2, p. 13, doi. 10.3390/cryptography8020013
- By:
- Publication type:
- Article
A Survey of Consortium Blockchain and Its Applications.
- Published in:
- Cryptography (2410-387X), 2024, v. 8, n. 2, p. 12, doi. 10.3390/cryptography8020012
- By:
- Publication type:
- Article