Search

Your search keyword '"cryptography"' showing total 22,998 results

Search Constraints

Start Over You searched for: Descriptor "cryptography" Remove constraint Descriptor: "cryptography" Topic computer Remove constraint Topic: computer
22,998 results on '"cryptography"'

Search Results

1. Lightweight Federated Learning for Large-Scale IoT Devices With Privacy Guarantee

2. Assessment of composite materials on encrypted secret message in image steganography using RSA algorithm

3. A channel of communication through secured 3-party AQKDP

4. Secure Remote Cloud File Sharing With Attribute-Based Access Control and Performance Optimization

5. Multi-User Dynamic Searchable Symmetric Encryption With Corrupted Participants

6. End to end secure e-voting using blockchain & quantum key distribution

7. Searchable Public-Key Encryption With Cryptographic Reverse Firewalls for Cloud Storage

8. Secure and Efficient Online Fingerprint Authentication Scheme Based On Cloud Computing

9. A coercion-resistant blockchain-based E-voting protocol with receipts

10. Privacy-Preserving Traceable Attribute-Based Keyword Search in Multi-Authority Medical Cloud

11. Formal security proof for a scheme on a topological network

12. A Formal Verification of ArpON – A Tool for Avoiding Man-in-the-Middle Attacks in Ethernet Networks

14. Checking Only When It Is Necessary: Enabling Integrity Auditing Based on the Keyword With Sensitive Information Privacy for Encrypted Cloud Data

15. An Automated Multi-Tab Website Fingerprinting Attack

16. Securing matrix counting-based secret-sharing involving crypto steganography

17. Blockchain state-of-the-art: architecture, use cases, consensus, challenges and opportunities

18. Fair Outsourcing Polynomial Computation Based on the Blockchain

19. Make Web3.0 Connected

20. Fair payments for privacy-preserving aggregation of mobile crowdsensing data

21. Cloud based private data analytic using secure computation over encrypted data

22. A Verifiable and Fair Attribute-Based Proxy Re-Encryption Scheme for Data Sharing in Clouds

23. A Key-Agreement Scheme for Cyber–Physical Systems

24. Privacy-Preserving IP Verification

25. Fast Secure and Anonymous Key Agreement Against Bad Randomness for Cloud Computing

26. Blockchain Security: A Survey of Techniques and Research Directions

27. Securing SoCs With FPGAs Against Rowhammer Attacks

28. A novel data classification-based scheme for cloud data security using various cryptographic algorithms

29. VQL: Efficient and Verifiable Cloud Query Services for Blockchain Systems

30. A novel system architecture for secure authentication and data sharing in cloud enabled Big Data Environment

31. EAFS: An Efficient, Accurate, and Forward Secure Searchable Encryption Scheme Supporting Range Search

32. A Blockchain-Based Shamir’s Threshold Cryptography Scheme for Data Protection in Industrial Internet of Things Settings

33. Ants can Carry Cheese: Secure and Private RFID-Enabled Third-Party Distribution

34. A secure and size efficient algorithm to enhance data hiding capacity and security of cover text by using unicode

35. Securely and Efficiently Outsourcing Decision Tree Inference

36. Toward Vehicular Digital Forensics From Decentralized Trust: An Accountable, Privacy-Preserving, and Secure Realization

37. Adaptive Privacy-Preserving Federated Learning for Fault Diagnosis in Internet of Ships

38. Harnessing Policy Authenticity for Hidden Ciphertext Policy Attribute-Based Encryption

39. Lightweight cryptography in IoT networks: A survey

40. A Scalable Protocol Level Approach to Prevent Machine Learning Attacks on Physically Unclonable Function Based Authentication Mechanisms for Internet of Medical Things

41. TPPR: A Trust-Based and Privacy-Preserving Platoon Recommendation Scheme in VANET

42. A Blockchain-Based Mutual Authentication Scheme for Collaborative Edge Computing

43. In-Band Secret-Free Pairing for COTS Wireless Devices

44. Verifiable Data Mining Against Malicious Adversaries in Industrial Internet of Things

45. Investigating the Prospect of Leveraging Blockchain and Machine Learning to Secure Vehicular Networks: A Survey

46. A Comprehensive Trustworthy Data Collection Approach in Sensor-Cloud Systems

47. Implementasi Algoritma Caesar Chiper dan Rail Fence untuk Peningkatan Keamanan Teks Berbasis Client Server

48. SecurePilot: Improving Wireless Security of Single-Antenna IoT Devices

49. Penerapan Message Diggest Algorithm MD5 untuk Pengamanan Data Karyawan PT. Swifect Berbasis Desktop

50. Quantum cryptography technique: A way to improve security challenges in mobile cloud computing (MCC)

Catalog

Books, media, physical & digital resources