Search

Your search keyword '"PUBLIC key cryptography"' showing total 619 results

Search Constraints

Start Over You searched for: Descriptor "PUBLIC key cryptography" Remove constraint Descriptor: "PUBLIC key cryptography" Publisher elsevier b.v. Remove constraint Publisher: elsevier b.v.
619 results on '"PUBLIC key cryptography"'

Search Results

1. A secure and efficient authentication key agreement scheme for industrial internet of things based on edge computing.

2. Foundation of a new technique for geometric and non-geometric multi-shapes similarities degrees using boundary unfolding transformation with applications.

3. Integrating Trustworthy Mechanisms to Support Data and Information Security in Health Sensors.

4. Various matching keys for asymmetric topology encryption.

5. Node injection for class-specific network poisoning.

6. The reversibility of cancelable biometric templates based on iterative perturbation stochastic approximation strategy.

7. Security Implementation on IoT using CoAP and Elliptical Curve Cryptography.

8. Decentralized and Multi-Authority based Public Key Infrastructure for Sharing Electronic Health Records.

9. Chosen ciphertext correlation power analysis on Kyber.

10. TBMOR: A lightweight trust-based model for secure routing of opportunistic networks.

11. Securing Text File Using Combination of Vigenere and One – Time Pad Cipher Algorithm.

12. Event-Triggered Impulsive Controller Design for Synchronization of Delayed Chaotic Neural Networks and Its Fractal Reconstruction: An Application to Image Encryption.

13. Subscripto multiplex: A Riemannian symmetric positive definite strategy for offline signature verification.

14. Decentralized and collaborative approach to mobile crowdsensing by implementing continuous feedback between the nodes.

15. Handling security issues by using homomorphic encryption in multi-cloud environment.

16. Dynamic event-based sliding mode security control for singular Semi-Markov jump LPV systems against deception attacks.

17. A Blockchain-Based cryptographic interaction method of digital museum collections.

18. Blockchain Based Data Integrity Security Management.

19. Analysing RSA and PAILLIER homomorphic Property for security in Cloud.

20. Pairing-free certificateless blind signature scheme for smart grid.

21. Exploiting compressed sensing and polynomial-based progressive secret image sharing for visually secure image selection encryption with authentication.

22. A constant-size lattice-based partially-dynamic group signature scheme in quantum random oracle model.

23. Efficient certificateless public integrity auditing of cloud data with designated verifier for batch audit.

24. A novel identity-based multi-signature scheme over NTRU lattices.

25. Self-attention eidetic 3D-LSTM: Video prediction models for traffic flow forecasting.

26. Compact modular multiplier design for strong security capabilities in resource-limited Telehealth IoT devices.

27. A secure hierarchical deterministic wallet with stealth address from lattices.

28. Optical cryptography with C-point vector beams.

29. A Privacy-Preserving Three-Factor Authentication System for IoT-Enabled Wireless Sensor Networks.

30. Heterogeneous and plaintext checkable signcryption for integrating IoT in healthcare system.

31. Efficient iNTRU-based public key authentication keyword searchable encryption in cloud computing.

32. KASE-AKA: Key-aggregate keyword searchable encryption against keyword guessing attack and authorization abuse.

33. Elliptic code-based oblivious polynomial evaluation.

34. A dynamic security region construction method and its existence proof for gaseous system.

35. Efficient and privacy-preserving outsourced unbounded inner product computation in cloud computing.

36. Secure personal-health-records searching in edge-based Internet of Medical Things through plaintext checkable encryption.

37. Tightly secure (H)IBE in the random oracle model.

38. A blind signature scheme for IoV based on 2D-SCML image encryption and lattice cipher.

39. Revisiting RSA-polynomial problem and semiprime factorization.

40. Drive–response asymptotic shape synchronization for a class of two-dimensional chaotic systems and its application in image encryption.

41. Designated-tester Identity-Based Authenticated Encryption with Keyword Search with applications in cloud systems.

42. IPCAS: An improved conditional privacy-preserving certificateless aggregate signature scheme without bilinear pairing for VANETs.

43. Improved RSA dynamic cryptographic accumulator-based anonymous batch authentication scheme for Internet of Vehicles.

44. Lossless and lossy remote sensing image encryption-compression algorithm based on DeepLabv3+ and 2D CS.

45. Lattice-based public-key encryption with equality test supporting flexible authorization in standard model.

46. Puncturable identity-based and attribute-based encryption from lattices.

47. Comparison of encrypted control approaches and tutorial on dynamic systems using Learning With Errors-based homomorphic encryption.

48. Secure and efficient two-party collaborative SM9 signature scheme suitable for smart home.

49. A blockchain-based models for student information systems.

50. Certificateless encryption scheme with provable security in the standard model suitable for mobile devices.

Catalog

Books, media, physical & digital resources