Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Artigo
|
![]() |
Analysis of the Possibility of Using Selected Hash Functions Submitted for the SHA-3 Competition in the SDEx Encryption MethodHłobaż, ArturInternational Journal of Electronics and Telecommunications, 2022-01, Vol.68 (1), p.57-62 [Periódico revisado por pares]Warsaw: Polish Academy of SciencesTexto completo disponível |
2 |
Material Type: Artigo
|
![]() |
Program for Simulation and Testing of Apply Cryptography of Advance Encryption Standard (AES) Algorithm with Rivest-Shamir-Adleman (RSA) Algorithm for Good PerformancePattanavichai, SantiInternational Journal of Electronics and Telecommunications, 2022-01, Vol.68 (3), p.475-481 [Periódico revisado por pares]Warsaw: Polish Academy of SciencesTexto completo disponível |
3 |
Material Type: Artigo
|
![]() |
Block Cipher Based Public Key Encryption via Indistinguishability ObfuscationHorubała, Aleksandra ; Waszkiewicz, Daniel ; Andrzejczak, Michał ; Sapiecha, PiotrInternational Journal of Electronics and Telecommunications, 2018-01, Vol.64 (2) [Periódico revisado por pares]Warsaw: Polish Academy of SciencesTexto completo disponível |
4 |
Material Type: Artigo
|
![]() |
The cybersecurity of Georgia and threats from RussiaMaisaia, Vakhtang ; Guchua, Alika ; Zedelashvili, ThornikeEastern review (Łódź, Poland), 2020-01, Vol.9 (9), p.105-119 [Periódico revisado por pares]Lodz: Wydawnictwo Uniwersytetu ŁódzkiegoTexto completo disponível |
5 |
Material Type: Artigo
|
![]() |
Dynamical behavior of a new jerk system inspired from chaotic memory oscillatorsAl-Azzawi, Saad FawziArchives of control sciences, 2024-01, Vol.34 (1), p.149-170 [Periódico revisado por pares]Warsaw: De Gruyter PolandTexto completo disponível |
6 |
Material Type: Artigo
|
![]() |
Multi-factor signcryption scheme for secure authentication using hyper elliptic curve cryptography and bio-hash functionRajasekar, Vani ; Premalatha, J. ; Sathya, K.Bulletin of the Polish Academy of Sciences. Technical sciences, 2020-08, Vol.68 (4), p.923-935 [Periódico revisado por pares]Warsaw: Polish Academy of SciencesTexto completo disponível |
7 |
Material Type: Artigo
|
![]() |
Challenges for Ukraine’s cyber security: National dimensionsKaterynchuk, PavloEastern review (Łódź, Poland), 2019-01, Vol.8 (8), p.137-147 [Periódico revisado por pares]Lodz: Wydawnictwo Uniwersytetu ŁódzkiegoTexto completo disponível |
8 |
Material Type: Artigo
|
![]() |
Comparison of power consumption in pipelined implementations of the BLAKE3 cipher in FPGA devicesSugier, JarosławInternational Journal of Electronics and Telecommunications, 2024-01, Vol.70 (1), p.23-30 [Periódico revisado por pares]Warsaw: Polish Academy of SciencesTexto completo disponível |
9 |
Material Type: Artigo
|
![]() |
Cyber security in supply chain management: A systematic reviewLatif, Mohd Nasrulddin Abd ; Aziz, Nurul Ashykin Abd ; Hussin, Nik Syuhailah Nik ; Aziz, Zuraimi AbdulLogForum, 2021, Vol.17 (1), p.49-57 [Periódico revisado por pares]Poznan: Wyzsza Szkola LogistykiTexto completo disponível |
10 |
Material Type: Artigo
|
![]() |
Tabu Search Against Permutation Based Stream CiphersPolak, Iwona ; Boryczka, MarcinInternational Journal of Electronics and Telecommunications, 2018-01, Vol.64 (2) [Periódico revisado por pares]Warsaw: Polish Academy of SciencesTexto completo disponível |