Search

Your search keyword '"PUBLIC key cryptography"' showing total 5,776 results

Search Constraints

Start Over You searched for: Descriptor "PUBLIC key cryptography" Remove constraint Descriptor: "PUBLIC key cryptography" Language english Remove constraint Language: english
5,776 results on '"PUBLIC key cryptography"'

Search Results

1. A Security Model for Web-Based Communication.

2. Verifiable Quantum Advantage without Structure.

3. Indistinguishability Obfuscation from Well-Founded Assumptions.

4. Random permutation-based mixed-double scrambling technique for encrypting MQIR image.

5. Demystifying Quantum.

6. The Encrypted Truth is Already Out There.

7. An asymmetric phase image encryption technique using Arnold transform, singular value decomposition, Hessenberg decomposition, and fractional Hartley transform.

8. Key Synchronization Method Based on Negative Databases and Physical Channel State Characteristics of Wireless Sensor Network.

9. On the tropical two-sided discrete logarithm and a key exchange protocol based on the tropical algebra of pairs.

10. Compact FE for unbounded attribute-weighted sums for logspace from SXDH.

11. Teaching Public Key Cryptography: A Software Approach.

12. A novel development to encrypt data communication under t-intuitionistic fuzzy environment.

13. RPKI Defense Capability Simulation Method Based on Container Virtualization.

14. Post-Quantum Delegated Proof of Luck for Blockchain Consensus Algorithm.

15. A Secure and Efficient Authentication Scheme for Large-Scale IoT Devices Based on Zero-Knowledge Proof.

16. An Improved Multi-Chaotic Public Key Algorithm Based on Chebyshev Polynomials.

17. Confidential Transaction Balance Verification by the Net Using Non-Interactive Zero-Knowledge Proofs.

18. Distributed Identity Authentication with Lenstra–Lenstra–Lovász Algorithm–Ciphertext Policy Attribute-Based Encryption from Lattices: An Efficient Approach Based on Ring Learning with Errors Problem.

19. A Blockchain and PKI-Based Secure Vehicle-to-Vehicle Energy-Trading Protocol.

20. Blockchain-assisted post-quantum privacy-preserving public auditing scheme to secure multimedia data in cloud storage.

21. A Novel DDoS Mitigation Strategy in 5G-Based Vehicular Networks Using Chebyshev Polynomials.

22. Anonymous Proxy signature scheme based on multivariate polynomials over finite field.

23. Secure multi-asks/bids with verifiable equality retrieval for double auction in smart grid.

24. Authenticated Multicast in Tiny Networks via an Extremely Low-Bandwidth Medium.

25. Blockchain-Based Certificateless Cross-Domain Authentication Scheme in the Industrial Internet of Things.

26. Secured Framework with a Hash Function-Enabled Keyword Search in Cloud Storage Services.

27. IHKM: an improved hierarchical key management scheme for wireless sensor network.

28. Hybrid cryptosystem enhanced RSA and RC4 chaotic map: A tutorial.

29. Analysis on improved scheme for reversible data hiding for encrypted images.

30. A secured self-financial management application with RSA encryption technology.

31. Improving the success rate of quantum algorithm attacking RSA encryption system.

32. GMS: an efficient fully homomorphic encryption scheme for secure outsourced matrix multiplication.

33. A semantic model based on ensemble learning and attribute-based encryption to increase security of smart buildings in fog computing.

34. State-of-the-art analysis of quantum cryptography: applications and future prospects.

35. A secure and efficient authentication key agreement scheme for industrial internet of things based on edge computing.

36. Post-quantum security design for hierarchical healthcare systems based on lattices.

37. Multi-party codebook distribution strategy based on secret sharing.

38. A compliance-based ranking of certificate authorities using probabilistic approaches.

39. Tightly-Secure Two-Tier Signatures on Code-Based Digital Signatures with Chameleon Hash Functions.

40. Secured wireless sensor networks using hybrid Rivest Shamir Adleman with ant lion optimization algorithm.

41. On Two Modifications of the McEliece PKE and the CFS Signature Scheme.

42. Robust Subgroup Multisignature with One-Time Public Keys in Order.

43. An Optimized Encryption Storage Scheme for Blockchain Data Based on Cold and Hot Blocks and Threshold Secret Sharing.

44. Simple PKE schemes from the TSPEM problem.

45. A Review of Image Steganography Based on Multiple Hashing Algorithm.

46. A Biometric Key-Enhanced Multimedia Encryption Algorithm for Social Media Blockchain.

47. Quantum-safe multi-server password-based authenticated key exchange protocol.

48. CryptoHHO: a bio-inspired cryptosystem for data security in Fog–Cloud architecture.

49. Quantum rectangular MinRank attack on multi-layer UOV signature schemes.

50. Multi-level authentication for security in cloud using improved quantum key distribution.

Catalog

Books, media, physical & digital resources