Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Artigo
|
![]() |
Machine Learning and Applied CryptographyAnees, Amir ; Hussain, Iqtadar ; Khokhar, Umar M. ; Ahmed, Fawad ; Shaukat, SajjadSecurity and communication networks, 2022-01, Vol.2022, p.1-3 [Periódico revisado por pares]London: HindawiTexto completo disponível |
2 |
Material Type: Artigo
|
![]() |
Quantum Cryptography for the Future Internet and the Security AnalysisZhou, Tianqi ; Shen, Jian ; Li, Xiong ; Wang, Chen ; Shen, Jun Wang, Guojun ; Guojun WangSecurity and communication networks, 2018-01, Vol.2018, p.1-7 [Periódico revisado por pares]London: HindawiTexto completo disponível |
3 |
Material Type: Artigo
|
![]() |
Neural Cryptography Based on Generalized Tree Parity Machine for Real-Life SystemsJeong, Sooyong ; Park, Cheolhee ; Hong, Dowon ; Seo, Changho ; Jho, Namsu Lombardi, Flavio ; Flavio LombardiSecurity and communication networks, 2021-02, Vol.2021, p.1-12 [Periódico revisado por pares]London: HindawiTexto completo disponível |
4 |
Material Type: Artigo
|
![]() |
Tropical Cryptography Based on Multiple Exponentiation Problem of MatricesHuang, Huawei ; Li, Chunhua Zhou, Zhili ; Zhili ZhouSecurity and communication networks, 2022-09, Vol.2022, p.1-9 [Periódico revisado por pares]London: HindawiTexto completo disponível |
5 |
Material Type: Artigo
|
![]() |
Visual Cryptography Using Computation-Free Bit-Plane ReconstructionLiu, Ya-Li ; Liu, Tao ; Yan, Bin ; Pan, Jeng-Shyang ; Yang, Hong-Mei Yang, Ching-Nung ; Ching-Nung YangSecurity and communication networks, 2022-06, Vol.2022, p.1-14 [Periódico revisado por pares]London: HindawiTexto completo disponível |
6 |
Material Type: Artigo
|
![]() |
Design of a new CP‐ABE with constant‐size secret keys for lightweight devices using elliptic curve cryptographyOdelu, Vanga ; Das, Ashok KumarSecurity and communication networks, 2016-11, Vol.9 (17), p.4048-4059 [Periódico revisado por pares]London: Hindawi LimitedTexto completo disponível |
7 |
Material Type: Artigo
|
![]() |
Lightweight Cryptography for Network-on-Chip Data EncryptionAyachi, Riadh ; Mhaouch, Ayoub ; Ben Abdelali, Abdessalem Gope, Prosanta ; Prosanta GopeSecurity and communication networks, 2021-05, Vol.2021, p.1-10 [Periódico revisado por pares]London: HindawiTexto completo disponível |
8 |
Material Type: Artigo
|
![]() |
Research on the Millionaires’ Problem under the Malicious Model Based on the Elliptic Curve CryptographyLiu, Xin ; Xu, Yang ; Xu, Gang ; Li, Baoshan Huang, Xin-Yi ; Xin-Yi HuangSecurity and communication networks, 2022-03, Vol.2022, p.1-11 [Periódico revisado por pares]London: HindawiTexto completo disponível |
9 |
Material Type: Artigo
|
![]() |
Applied Cryptography and Noise Resistant Data SecurityHussain, Iqtadar ; Ahmed, Fawad ; Khokhar, Umar M. ; Anees, AmirSecurity and communication networks, 2018-01, Vol.2018, p.1-2 [Periódico revisado por pares]London: HindawiTexto completo disponível |
10 |
Material Type: Artigo
|
![]() |
An authentication scheme with identity‐based cryptography for M2M security in cyber‐physical systemsChen, Shuo ; Ma, Maode ; Luo, ZhenxingSecurity and communication networks, 2016-07, Vol.9 (10), p.1146-1157 [Periódico revisado por pares]London: Hindawi LimitedTexto completo disponível |