174 results on '"Cryptography -- Usage"'
Search Results
2. Ride the Blockchain Roller Coaster: L&D professionals should keep in mind these seven aspects about blockchain
3. Study Data from SRM University-AP Update Knowledge of Information and Data Encoding and Encryption (The use of IoT-based wearable devices to ensure secure lightweight payments in FinTech applications)
4. Provision Of Services For The Provision Of Non-exclusive Rights (licenses) For The Use Of Cryptographic Information Protection Tools 'cryptopro'
5. PsiQuantum publishes paper projecting a 700x reduction in the computational resource requirements for breaking Elliptic Curve Cryptography using a fault tolerant quantum computer
6. Flipping heck! Random numbers
7. Shaping the future of financial reporting: Dr John McCallig's research into the accounting system of the future built on blockchain technology and cryptography has earned him a sought-after award for invention
8. Infineon Technologies AG Researcher Focuses on Information and Data Encoding and Encryption (Blockchain-Based Services Implemented in a Microservices Architecture Using a Trusted Platform Module Applied to Electric Vehicle Charging Stations)
9. The Provision Of Services For The Transfer Of Licenses Of Non -exclusive Rights Of The Use Of Cryptographic Information Protection Of Information In The Framework Of The Organization And Conduct Of The Gia In The Moscow Region In 2023
10. The Provision Of Non -exclusive Rights To The Use Of Software And Cryptographic Information Protection Of Information For The Organization Of Secure Communication Users Used To Organize Information Protection In The Russian Ministry Of Internal Affairs In
11. Lone Star
12. Studies from Sapienza University of Rome in the Area of Cryptography Described (A Novel FPGA Implementation of the NAND-PUF with Minimal Resource Usage and High Reliability)
13. Reports from Sastra Deemed to be University Advance Knowledge in Telemedicine (Reversible Data Hiding Scheme Using Deep Learning and Visual Cryptography for Medical Image Communication)
14. Indian Institute of Technology Researchers Update Knowledge of Cryptography (Intrusion Detection System for IoT Using Logical Analysis of Data and Information Gain Ratio)
15. Implementation and testing of high-speed CMOS true random number generators based on chaotic systems
16. Ending piracy of integrated circuits
17. Evaluation of power constant dual-rail logics countermeasures against DPA with design time security metrics
18. Word-based montgomery modular multiplication algorithm for low-latency scalable architectures
19. P2P reputation management using distributed identities and decentralized recommendation chains
20. The tiled bitmap forensic analysis algorithm
21. Pseudorandom bit generation using coupled congruential generators
22. Researchers extend the use of deep learning for distinguishing encrypted text from random noise
23. Leveraging identity-based cryptography for node ID assignment in structured P2P systems
24. Dynamic routing with security considerations
25. How to keep secrets safe
26. Mutual anonymity for mobile P2P systems
27. Low-complexity bit-parallel square root computation over GF([2.sup.m]) for all trinomials
28. Secure antnet routing algorithm for scalable Adhoc etworks using Elliptic Curve Cryptography
29. A new error correction intuitive approach in quantum communications protocols
30. Comb architectures for finite field multiplication in IF2m
31. A generic construction of Cartesian authentication codes
32. An on-demand coherent single-electron source
33. Generalized binary Udaya-Siddiqi sequences
34. A joint signal processing and cryptographic approach to multimedia encryption
35. An improved cryptanalytic attack on knapsack cipher using genetic algorithm
36. Algebraic immunity for cryptographically significant Boolean functions: analysis and construction
37. Area-throughput trade-offs for fully pipelined 30 to 70 Gbits/s AES processors
38. On the shannon cipher system with a capacity-limited key-distribution channel
39. Analysis of Sun et al.Es linkability attack on some proxy blind signature schemes
40. Cryptography as an operating system service: a case study
41. Protecting File Systems with Transient Authentication
42. The Italian academic community's electronic voting system
43. A system theory approach for designing cryptosystems based on hyperchaos
44. Dynamic participation in a secure conference scheme for mobile communications
45. Vice over IP: a growing cadre of criminals is hiding secret messages in voice data
46. Open systems, free markets, and regulation of Internet commerce.
47. Philippines : DICT prescribes use of latest cryptographic protocols for gov't websites
48. Visual cryptography and Bit-Plane Complexity Segmentation
49. Security: applying cryptography using the CNG APIs in Windows Vista
50. Secure spread spectrum watermarking for multimedia
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.