Search

Your search keyword '"nist"' showing total 997 results

Search Constraints

Start Over You searched for: Descriptor "nist" Remove constraint Descriptor: "nist" Search Limiters Peer Reviewed Remove constraint Search Limiters: Peer Reviewed
997 results on '"nist"'

Search Results

1. Cutting-Edge Amalgamation of Web 3.0 and Hybrid Chaotic Blockchain Authentication for Healthcare 4.0.

2. ProtectingSmall and Medium Enterprises: A Specialized Cybersecurity Risk Assessment Framework and Tool.

3. Crypto-Coding Scheme via Dynamic Interleaver for New Communication Standards.

4. ДВОРІВНЕВА КОНЦЕПЦІЯ ДЛЯ МОДЕЛЮВАННЯ ЄДИНОЇ ЗАВАДОСТІЙКОЇ ПЕРЕДАЧІ ЦИФРОВИХ ДАНИХ

5. Reconfigurable Image Confusion Scheme Using Large Period Pseudorandom Bit Generator Based on Coupled-Variable Input LCG and Clock Divider.

6. Preimage attacks on reduced-round Ascon-Xof.

7. Advancing cryptography: a novel hybrid cipher design merging Feistel and SPN structures.

8. Blockchain-Inspired Lightweight Dynamic Encryption Schemes for a Secure Health Care Information Exchange System.

9. Behind the Code: Identifying Zero-Day Exploits in WordPress.

10. Enhancing the Security of Classical Communication with Post-Quantum Authenticated-Encryption Schemes for the Quantum Key Distribution.

11. Various pseudo random number generators based on memristive chaos map model.

12. IMPROVING PROTECTION OF FALCON ELECTRONIC SIGNATURE SOFTWARE IMPLEMENTATIONS AGAINST ATTACKS BASED ON FLOATING POINT NOISE.

13. Securing Data Exchange with Elliptic Curve Cryptography: A Novel Hash-Based Method for Message Mapping and Integrity Assurance.

14. Differential fault attack on SPN-based sponge and SIV-like AE schemes.

16. Design of a New Neuro-Generator with a Neuronal Module to Produce Pseudorandom and Perfectly Pseudorandom Sequences.

17. A novel TT-SHO QoS aware and secured Vehicular Adhoc Network (VANET) routing protocol for smart intelligent transportation.

18. TinyJAMBU Hardware Implementation for Low Power

19. A Novel Approach Based on Machine Learning, Blockchain, and Decision Process for Securing Smart Grid

20. Cutting-Edge Amalgamation of Web 3.0 and Hybrid Chaotic Blockchain Authentication for Healthcare 4.0

22. Improving the performance of authentication protocols using efficient modular multi exponential technique.

23. Key Reuse Attacks on Post-quantum Cryptosystems, Revisited.

24. RATIONALE FOR IMPROVING AUTHENTICATION PROTOCOLS IN THE CONDITIONS OF POST-QUANTUM CRYPTOGRAPHY.

25. NIST CSF 2.0: НОВИЙ ФРЕЙМВОРК З КІБЕРБЕЗПЕКИ ВІД НАЦІОНАЛЬНОГО ІНСТИТУТУ СТАНДАРТІВ І ТЕХНОЛОГІЙ США.

26. Critical Analysis of Beta Random Variable Generation Methods.

27. NIST Test Validation for Lorenz Chaotic Random Generator CRN.

28. Implementation Framework National Institute of Standards and Technology (Nist) Evidence Digital In The Forensic Process Social Media.

29. Comparative Study of Cloud Forensic Investigation Using ADAM And NIST 800-86 Methods in Private Cloud Computing

30. An Analysis of Cloud Security Frameworks, Problems and Proposed Solutions

31. Enhancing the Security of Classical Communication with Post-Quantum Authenticated-Encryption Schemes for the Quantum Key Distribution

32. Distributed private preserving learning based chaotic encryption framework for cognitive healthcare IoT systems

33. A Lightweight Image Encryption Algorithm Based on Elliptic Curves and a 5D Logistic Map.

34. Limit theorem for a smoothed version of the spectral test for testing the equiprobability of a binary sequence.

35. A Survey of Post-Quantum Cryptography: Start of a New Race.

36. Resource guide for teaching post-quantum cryptography.

37. An Analysis of Cloud Security Frameworks, Problems and Proposed Solutions.

38. Performance Evaluation of Business Continuity Plan in Dealing With Threats and Risks In Cilegon Companies Use ISO 22301:2019 & NIST Sp 800-30 R1 Frameworks Case Study: PT. X.

39. Simulation of QTRNG on IBM’s Q Experience Using Rotation and Phase Quantum Gates.

40. Model Manajemen Risiko Sistem Informasi Untuk Sistem Informasi Manajemen Kepegawaian.

41. Latent Fingerprint Recognition: Fusion of Local and Global Embeddings.

42. A cyber resilience analysis case study of an industrial operational technology environment.

43. CYBERSECURITY POSTURE RESEARCH IN SMALL ORGANIZATIONS.

44. Codesign for Generation of Large Random Sequences on Zynq FPGA.

45. Key Generation Technique Based on Channel Characteristics for MIMO-OFDM Wireless Communication Systems

46. Statistical Characteristics Improvement of a Hardware Random Number Generator by a Software Method

47. Quantum true random number generation on IBM’s cloud platform

48. Hyperchaotic Maps and the Single Neuron Model: A Novel Framework for Chaos-Based Image Encryption.

49. A Novel Strong S-Box Design Using Quantum Crossover and Chaotic Boolean Functions for Symmetric Cryptosystems.

50. A comprehensive survey on machine translation for English, Hindi and Sanskrit languages.

Catalog

Books, media, physical & digital resources