Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Artigo
|
![]() |
A Generic Construction of Quantum-Oblivious-Key-Transfer-Based Private Query with Ideal Database Security and Zero FailureWei, Chun-Yan ; Cai, Xiao-Qiu ; Liu, Bin ; Wang, Tian-Yin ; Gao, FeiIEEE transactions on computers, 2018-01, Vol.67 (1), p.2-8 [Periódico revisado por pares]New York: IEEETexto completo disponível |
2 |
Material Type: Artigo
|
![]() |
Quantum-Safe Round-Optimal Password Authentication for Mobile DevicesLi, Zengpeng ; Wang, Ding ; Morais, EduardoIEEE transactions on dependable and secure computing, 2022-05, Vol.19 (3), p.1885-1899Washington: IEEETexto completo disponível |
3 |
Material Type: Artigo
|
![]() |
Synchronization of Tree Parity Machines Using Nonbinary Input VectorsStypiski, Milosz ; Niemiec, MarcinIEEE transaction on neural networks and learning systems, 2024-01, Vol.35 (1), p.1423-1429United States: IEEETexto completo disponível |
4 |
Material Type: Artigo
|
![]() |
Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional BoundWang, Ding ; Wang, PingIEEE transactions on dependable and secure computing, 2018-07, Vol.15 (4), p.708-722Washington: IEEETexto completo disponível |
5 |
Material Type: Artigo
|
![]() |
Supersingular Isogeny Diffie-Hellman Key Exchange on 64-Bit ARMJalali, Amir ; Azarderakhsh, Reza ; Kermani, Mehran Mozaffari ; Jao, DavidIEEE transactions on dependable and secure computing, 2019-09, Vol.16 (5), p.902-912Washington: IEEETexto completo disponível |
6 |
Material Type: Artigo
|
![]() |
Multi-protocol updating for seamless key negotiation in quantum metropolitan networksZhu, Jiali ; Cao, Yuan ; Guo, Mingxuan ; Zhou, Xingyu ; Zhang, Chunhui ; Li, Jian ; Yu, Xiaosong ; Zhao, Yongli ; Zhang, Jie ; Wang, QinJournal of optical communications and networking, 2024-07, Vol.16 (7), p.735-749 [Periódico revisado por pares]Piscataway: Optica Publishing GroupTexto completo disponível |
7 |
Material Type: Artigo
|
![]() |
Practical and Provably Secure Three-Factor Authentication Protocol Based on Extended Chaotic-Maps for Mobile Lightweight DevicesQiu, Shuming ; Wang, Ding ; Xu, Guoai ; Kumari, SaruIEEE transactions on dependable and secure computing, 2022-03, Vol.19 (2), p.1338-1351Washington: IEEETexto completo disponível |
8 |
Material Type: Artigo
|
![]() |
From Keys to Databases—Real-World Applications of Secure Multi-Party ComputationArcher, David W ; Bogdanov, Dan ; Lindell, Yehuda ; Kamm, Liina ; Nielsen, Kurt ; Pagter, Jakob Illeborg ; Smart, Nigel P ; Wright, Rebecca NComputer journal, 2018-12 [Periódico revisado por pares]Texto completo disponível |
9 |
Material Type: Artigo
|
![]() |
Optical identification using physical unclonable functionsNadimi Goki, Pantea ; Civelli, Stella ; Parente, Emanuele ; Caldelli, Roberto ; Teferi Mulugeta, Thomas ; Sambo, Nicola ; Secondini, Marco ; Poti, LucaJournal of optical communications and networking, 2023-10, Vol.15 (10), p.E63-E73 [Periódico revisado por pares]Piscataway: Optica Publishing GroupTexto completo disponível |
10 |
Material Type: Artigo
|
![]() |
SpreadMeNot: A Provably Secure and Privacy-Preserving Contact Tracing ProtocolTedeschi, Pietro ; Bakiras, Spiridon ; Pietro, Roberto DiIEEE transactions on dependable and secure computing, 2023-05, Vol.20 (3), p.2500-2515Washington: IEEETexto completo disponível |