Search

Your search keyword '"PUBLIC key cryptography"' showing total 6,335 results

Search Constraints

Start Over You searched for: Descriptor "PUBLIC key cryptography" Remove constraint Descriptor: "PUBLIC key cryptography"
6,335 results on '"PUBLIC key cryptography"'

Search Results

1. Verifiable Quantum Advantage without Structure.

2. Random permutation-based mixed-double scrambling technique for encrypting MQIR image.

3. Indistinguishability Obfuscation from Well-Founded Assumptions.

4. Improving the success rate of quantum algorithm attacking RSA encryption system.

5. Blockchain-assisted post-quantum privacy-preserving public auditing scheme to secure multimedia data in cloud storage.

6. A Novel DDoS Mitigation Strategy in 5G-Based Vehicular Networks Using Chebyshev Polynomials.

7. Anonymous Proxy signature scheme based on multivariate polynomials over finite field.

8. Secured Framework with a Hash Function-Enabled Keyword Search in Cloud Storage Services.

9. IHKM: an improved hierarchical key management scheme for wireless sensor network.

10. State-of-the-art analysis of quantum cryptography: applications and future prospects.

11. A secure and efficient authentication key agreement scheme for industrial internet of things based on edge computing.

12. Post-quantum security design for hierarchical healthcare systems based on lattices.

13. Multi-party codebook distribution strategy based on secret sharing.

14. A compliance-based ranking of certificate authorities using probabilistic approaches.

15. Tightly-Secure Two-Tier Signatures on Code-Based Digital Signatures with Chameleon Hash Functions.

16. Secured wireless sensor networks using hybrid Rivest Shamir Adleman with ant lion optimization algorithm.

17. On Two Modifications of the McEliece PKE and the CFS Signature Scheme.

18. Robust Subgroup Multisignature with One-Time Public Keys in Order.

19. An Optimized Encryption Storage Scheme for Blockchain Data Based on Cold and Hot Blocks and Threshold Secret Sharing.

20. Simple PKE schemes from the TSPEM problem.

21. A Review of Image Steganography Based on Multiple Hashing Algorithm.

22. A Biometric Key-Enhanced Multimedia Encryption Algorithm for Social Media Blockchain.

23. Quantum-safe multi-server password-based authenticated key exchange protocol.

24. CryptoHHO: a bio-inspired cryptosystem for data security in Fog–Cloud architecture.

25. Quantum rectangular MinRank attack on multi-layer UOV signature schemes.

26. Enhancing trust and security in IoT computing offloading through game theory and blockchain‐based control strategy.

27. An efficient Moving object, Encryption, Compression and Interpolation technique for video steganography.

28. Performance comparison of quantum-safe multivariate polynomial public key encapsulation algorithm.

29. Multi-level authentication for security in cloud using improved quantum key distribution.

30. Token open secure and practical NTRU-based updatable encryption.

31. DTR-SHIELD: Mutual Synchronization for Protecting against DoS Attacks on the SHIELD Protocol with AES-CTR Mode.

32. A Sustainable Data Encryption Storage and Processing Framework via Edge Computing-Driven IoT.

33. A Secure Protocol Authentication Method Based on the Strand Space Model for Blockchain-Based Industrial Internet of Things.

34. Expanded low-rank parity-check codes and their application to cryptography.

35. A Secure Certificate-Based Data Integrity Auditing Protocol with Cloud Service Providers.

36. Enabling privacy-preserving data validation from multi-writer encryption with aggregated keywords search.

37. A Fountain-Coding Based Cooperative Jamming Strategy for Secure Service Migration in Edge Computing.

38. Delegatable searchable encryption with specified keywords for EHR systems.

39. Design of an Alternative to Polynomial Modified RSA Algorithm.

40. The power-generalized k-Horadam sequences in different modules and a new cryptographic method with these sequences.

41. "A lightweight authentication scheme for 6LoWPAN-based Internet-of -things".

42. Study on the Stability of Complex Networks in the Stock Markets of Key Industries in China.

43. BACASE-SH: Blockchain-based authenticated certificate-less asymmetric searchable encryption for smart healthcare.

44. Lower rounds lattice-based anonymous AKA under the seCK model for the IoT.

45. An optimal secure and reliable certificateless proxy signature for industrial internet of things.

46. Coupling bit and modular arithmetic for efficient general-purpose fully homomorphic encryption.

47. Lightweight Hardware-Based Cache Side-Channel Attack Detection for Edge Devices (Edge-CaSCADe).

48. Robust blind image watermarking scheme using a modified embedding process based on differential method in DTCWT-DCT.

49. Quantum private comparison for the socialist millionaire problem.

50. N -Dimensional Non-Degenerate Chaos Based on Two-Parameter Gain with Application to Hash Function.

Catalog

Books, media, physical & digital resources