Search

Your search keyword '"Cryptographic"' showing total 138 results

Search Constraints

Start Over You searched for: Descriptor "Cryptographic" Remove constraint Descriptor: "Cryptographic"
138 results on '"Cryptographic"'

Search Results

1. Cadastral: Blockchain-Based Land Registration System

2. Mitigating MEV attacks with a two-tiered architecture utilizing verifiable decryption

3. Mitigating MEV attacks with a two-tiered architecture utilizing verifiable decryption.

4. A Systematic Review: Post Quantum Cryptography to Secure Data Transmission.

5. An Encrypting Electronic Payments Based on Kerberos Cryptography Protocol.

6. An Efficient Cryptographic Technique to Improve Data Privacy and Security in E-Commerce

8. Design and implementation of a cryptographic algorithm based on the AES advanced encryption standard for UHF RFID systems.

9. Enhancing Efficiency and Security in Unbalanced PSI-CA Protocols through Cloud Computing and Homomorphic Encryption in Mobile Networks.

10. User authentication using gait and enhanced attribute-based encryption: a case of smart home.

11. Emergence of Novel WEDEx-Kerberotic Cryptographic Framework to Strengthen the Cloud Data Security against Malicious Attacks.

12. Biometric Fusion for Enhanced Authentication in Cloud Computing Environments.

13. A Holistic Secure Communication Mechanism Using a Multilayered Cryptographic Protocol to Enhanced Security.

15. Cryptocurrency and Application of Blockchain Technology: An Innovative Perspective

16. Blockchain Mechanism for Resolving Privacy Issues in a Smart City

18. Man-In-The Middle Attack Detection Scheme on Data Aggregation in Wireless Sensor Networks.

19. Enhancing Efficiency and Security in Unbalanced PSI-CA Protocols through Cloud Computing and Homomorphic Encryption in Mobile Networks

20. Emergence of Novel WEDEx-Kerberotic Cryptographic Framework to Strengthen the Cloud Data Security against Malicious Attacks

21. Lightweight Cryptographic Simulation of Power IoT Fused with Bayesian Network Algorithms.

22. Exploring Blockchain Data Analysis and Its Communications Architecture: Achievements, Challenges, and Future Directions: A Review Article.

25. Secure Key Management and Mutual Authentication Protocol for Wireless Sensor Network by Linking Edge Devices using Hybrid Approach.

26. Lightweight, secure, efficient, and dynamic scheme for mutual authentication of devices in Internet‐of‐Things‐Fog environment.

28. A Comparison Of Symmetric Key Encryption Algorithms In Secure Cloud Storage Using Ehrs.

30. The Need to Use a Hash Function to Build a Crypto Algorithm for Blockchain

31. A Secure Lightweight Mutual Authentication and Message Exchange Protocol for IoT Environments Based on the Existence of Active Server

33. A Survey on 5G and LPWAN-IoT for Improved Smart Cities and Remote Area Applications: From the Aspect of Architecture and Security.

34. Graceful Labeling and Skolem Graceful Labeling on the U-star Graph and It’s Application in Cryptography

35. Flawed implemented cryptographic algorithm in the Microsoft ecosystem.

36. A COMPREHENSIVE REVIEW ON IoT-BASED HEALTHCARE SECURITY THROUGH BLOCKCHAIN TECHNOLOGY.

37. On Deception-Based Protection Against Cryptographic Ransomware

38. Analysis of Wormhole Attacks in Wireless Sensor Networks

39. A Survey on 5G and LPWAN-IoT for Improved Smart Cities and Remote Area Applications: From the Aspect of Architecture and Security

41. Securing recognized multimodal biometric images using cryptographic model.

42. Secure Sharing of IOT Data in Cloud Environment Using Attribute-Based Encryption.

43. 보안 DDS(Data Distribution Service)의 디스커버리 및 메시지 전송 성능 분석.

44. AES High-Level SystemC Modeling using Aspect Oriented Programming Approach.

45. THE CRYPTOGRAPHIC CARTOUCHE OF NECTANEBO II FROM THE GREAT TEMPLE OF PR-BASTT

46. Simple, secure, and lightweight mechanism for mutual authentication of nodes in tiny wireless sensor networks.

47. PVHArray: An Energy-Efficient Reconfigurable Cryptographic Logic Array With Intelligent Mapping.

48. Performance Analysis Of The Combination Of Advanced Encryption Standard Cryptography Algorithms With Luc For Text Security

Catalog

Books, media, physical & digital resources