Search

Your search keyword '"Key management"' showing total 7,281 results

Search Constraints

Start Over You searched for: Descriptor "Key management" Remove constraint Descriptor: "Key management"
7,281 results on '"Key management"'

Search Results

3. Integrating Fuzzy Graph Theory into Cryptography: A Survey of Techniques and Security Applications.

4. A Certificate-Less Distributed Key Management Scheme for Space Networks.

5. Guideline for implementing cryptography in the federal government

6. A Public Key Infrastructure Based on Blockchain for IoT-Based Healthcare Systems.

7. Authenticated Multicast in Tiny Networks via an Extremely Low-Bandwidth Medium.

8. Protecting Instant Messaging Notifications against Physical Attacks: A Novel Instant Messaging Notification Protocol Based on Signal Protocol.

9. Secure privacy-enhanced fast authentication and key management for IoMT-enabled smart healthcare systems.

10. SAIF-Cnet: self-attention improved faster convolutional neural network for decentralized blockchain-based key management protocol.

11. Study of Network Security Based on Key Management System for In-Vehicle Ethernet.

12. Raspberry Pi-Based Encrypted Cloud Storage Gateway

13. Securing Asymmetric Key Cryptography in 6G Wireless and Mobile Environments: A Comprehensive Review and Proposed Hybrid Cryptosystem

15. Optimized Biometric Key Management System for Enhanced Security

16. Key Cooperative Attribute-Based Encryption

17. The Power of Many: Securing Organisational Identity Through Distributed Key Management

18. Taxonomy of Image Encryption Techniques - A Survey

19. Key Management Based on Ownership of Multiple Authenticators in Public Key Authentication

20. A Survey on Path Key Establishment

21. Methods for Securing Big Data

22. An Updatable Key Management Scheme for Underwater Wireless Sensor Networks

23. Decentralized Key Management for Digital Identity Wallets

24. A Verifiable Dynamic Multi-secret Sharing Obfuscation Scheme Applied to Data LakeHouse

25. BKRSC-IoT: Blockchain-Based Key Revocation Using Smart Contracts for IoT Networks

26. JWTKey: Automatic Cryptographic Vulnerability Detection in JWT Applications

27. A Survey on Blockchain-Based Key Management Protocols

28. An Automated Disruption-Tolerant Key Management Framework for Critical Systems

29. Achieving Secured Medical Network (SMN) through Stateless Mechanism and SkeyM in Medical-Internet of Things (M-IoT)

30. Efficient key distribution for secure and energy-optimized communication in wireless sensor network using bioinspired algorithms

31. Multi-Tenant-Oriented Trusted Container Hierarchical Key Management Method.

32. Achieving Secured Medical Network (SMN) through Stateless Mechanism and SkeyM in Medical-Internet of Things (M-IoT).

33. SWEEPER: Secure Waterfall Energy-Efficient Protocol-Enabled Routing in FANET.

34. A Practical and UC-Secure Decentralized Key Management and Authentication Scheme Based on Blockchain for VNDN.

35. Cyber Security - Current and Future Trends.

36. KMS–AMI: an efficient and scalable key management scheme for secure two-way communications in advanced metering infrastructure of smart grid.

37. Cordiality and Magicness of the Cartesian Product of Digraphs.

38. Efficient key distribution for secure and energy-optimized communication in wireless sensor network using bioinspired algorithms.

39. Blockchain-Based Key Management Scheme Using Rational Secret Sharing.

40. A Decentralized Proxy-JRC Authentication System for Scalable IETF 6TiSCH Networks

41. Design of an Efficient and Secure Authentication Scheme for Cloud-Fog-Device Framework Using Key Agreement and Management

42. A Certificate-Less Distributed Key Management Scheme for Space Networks

43. TAKM-FC: Two-way Authentication with efficient Key Management in Fog Computing Environments.

44. Securing Internet of Things Applications Using Software-Defined Network-Aided Group Key Management with a Modified One-Way Function Tree.

45. High-speed VLC Security System Using Two Key Services by Multi-point Analysis.

46. Protecting Instant Messaging Notifications against Physical Attacks: A Novel Instant Messaging Notification Protocol Based on Signal Protocol

47. Homomorphic Encryption Schemes Using Nested Matrices

48. Analysis for Detection in MANETs: Security Perspective

49. Decentralized SGX-Based Cloud Key Management

Catalog

Books, media, physical & digital resources