Search

Your search keyword '"Key (cryptography)"' showing total 192,284 results

Search Constraints

Start Over You searched for: Descriptor "Key (cryptography)" Remove constraint Descriptor: "Key (cryptography)"
192,284 results on '"Key (cryptography)"'

Search Results

1. Preface to the Fourth Edition

2. Supply Chain Resilience Assessment With Financial Considerations: A Bayesian Network-Based Method

3. Forward-selected panel data approach for program evaluation

4. Performance analysis of a drop-swap terminal to mitigate truck congestion at chemical sites

5. Towards 3D Centimeter-Level Passive Gesture Tracking With Two WiFi Links

6. Fronthaul-Aware Scheduling Strategies for Dynamic Modulation Compression in Next Generation RANs

7. Evidence on the Determinants of the Likelihood and Speed of Technological Convergence: A Knowledge Search and Recombination Perspective in Key Enabling Technologies

8. Adversarial Attacks Against Deep Generative Models on Data: A Survey

9. OL-EUA: Online User Allocation for NOMA-Based Mobile Edge Computing

10. On the role of key players in rural social innovation processes

11. Processing, storage and display of physiological measurements

12. Printing Parameters of Fused Filament Fabrication Affect Key Properties of Four-Dimensional Printed Shape-Memory Polymers

13. Balancing Security and Privacy in Genomic Range Queries

15. VASE: Variational Assorted Surprise Exploration for Reinforcement Learning

16. Grid-Forming Inverters: Are They the Key for High Renewable Penetration?

17. Enhancing Drug-Drug Interaction Prediction Using Deep Attention Neural Networks

18. AI-Enabled IIoT for Live Smart City Event Monitoring

19. Reverse stress testing: Scenario design for macroprudential stress tests

20. Event-Triggered Cooperative Output Regulation of Heterogeneous Multiagent Systems Under Switching Directed Topologies

21. A review on zero energy buildings – Pros and cons

22. An Efficient Missing Tag Identification Approach in RFID Collisions

23. D2MIF: A Malicious Model Detection Mechanism for Federated-Learning-Empowered Artificial Intelligence of Things

24. Toward Better Structure and Constraint to Mine Negative Sequential Patterns

25. Adversarial Learning Networks for FinTech Applications Using Heterogeneous Data Sources

26. Next-Generation Internet of Things in Fintech Ecosystem

27. The Zimbabwean Constitutional Court as a key site of struggle for human rights protection: A critical assessment of its human rights jurisprudence during its first six years

28. Assessment of composite materials on encrypted secret message in image steganography using RSA algorithm

29. A channel of communication through secured 3-party AQKDP

30. PrivKVM*: Revisiting Key-Value Statistics Estimation With Local Differential Privacy

31. ML Based Intrusion Detection Scheme for various types of attacks in a WSN using C4.5 and CART classifiers

32. Learning-Based Edge Sensing and Control Co-Design for Industrial Cyber–Physical System

33. Human Emotion Recognition With Relational Region-Level Analysis

34. Virtual safety device for women security

35. Mixer-Based Semantic Spread for Few-Shot Learning

36. Dynamic Computation and Network Chaining in Integrated SDN/NFV Cloud Infrastructure

37. A Many-Objective Optimization Based Federal Deep Generation Model for Enhancing Data Processing Capability in IoT

38. Graph Convolutional Network-Based Interpretable Machine Learning Scheme in Smart Grids

39. Smart virtual assistant

40. An empirical study of online food delivery services from applications perspective

41. Text hiding in an image using least significant bit and ant colony optimization

42. Audits and COVID-19: A paradigm shift in the making

43. Blockchain-Based Secure Key Management for Mobile Edge Computing

44. Formal security proof for a scheme on a topological network

45. An image encryption based on hybrid PRESENT-SPECK algorithm

46. Optimized garbage segregation and monitoring system

47. Big-data driven approaches in materials science on cloud storage API through optimal homomorphic encryption

48. Accelerating Distributed Learning in Non-Dedicated Environments

49. Addressing Hindsight Bias in Multigoal Reinforcement Learning

50. Integrated Generative Model for Industrial Anomaly Detection via Bidirectional LSTM and Attention Mechanism

Catalog

Books, media, physical & digital resources