skip to main content
Primo Advanced Search
Primo Advanced Search Query Term
Primo Advanced Search Query Term
Primo Advanced Search Query Term
Primo Advanced Search prefilters
Devido a um problema temporário, o resultado pode estar incompleto.
Resultados 1 2 3 4 5 next page
Refinado por: Nome da Publicação: Security And Communication Networks remover assunto: Technology remover
Result Number Material Type Add to My Shelf Action Record Details and Options
1
Machine Learning and Applied Cryptography
Material Type:
Artigo
Adicionar ao Meu Espaço

Machine Learning and Applied Cryptography

Anees, Amir ; Hussain, Iqtadar ; Khokhar, Umar M. ; Ahmed, Fawad ; Shaukat, Sajjad

Security and communication networks, 2022-01, Vol.2022, p.1-3 [Periódico revisado por pares]

London: Hindawi

Texto completo disponível

2
Quantum Cryptography for the Future Internet and the Security Analysis
Material Type:
Artigo
Adicionar ao Meu Espaço

Quantum Cryptography for the Future Internet and the Security Analysis

Zhou, Tianqi ; Shen, Jian ; Li, Xiong ; Wang, Chen ; Shen, Jun Wang, Guojun ; Guojun Wang

Security and communication networks, 2018-01, Vol.2018, p.1-7 [Periódico revisado por pares]

London: Hindawi

Texto completo disponível

3
Neural Cryptography Based on Generalized Tree Parity Machine for Real-Life Systems
Material Type:
Artigo
Adicionar ao Meu Espaço

Neural Cryptography Based on Generalized Tree Parity Machine for Real-Life Systems

Jeong, Sooyong ; Park, Cheolhee ; Hong, Dowon ; Seo, Changho ; Jho, Namsu Lombardi, Flavio ; Flavio Lombardi

Security and communication networks, 2021-02, Vol.2021, p.1-12 [Periódico revisado por pares]

London: Hindawi

Texto completo disponível

4
Tropical Cryptography Based on Multiple Exponentiation Problem of Matrices
Material Type:
Artigo
Adicionar ao Meu Espaço

Tropical Cryptography Based on Multiple Exponentiation Problem of Matrices

Huang, Huawei ; Li, Chunhua Zhou, Zhili ; Zhili Zhou

Security and communication networks, 2022-09, Vol.2022, p.1-9 [Periódico revisado por pares]

London: Hindawi

Texto completo disponível

5
Visual Cryptography Using Computation-Free Bit-Plane Reconstruction
Material Type:
Artigo
Adicionar ao Meu Espaço

Visual Cryptography Using Computation-Free Bit-Plane Reconstruction

Liu, Ya-Li ; Liu, Tao ; Yan, Bin ; Pan, Jeng-Shyang ; Yang, Hong-Mei Yang, Ching-Nung ; Ching-Nung Yang

Security and communication networks, 2022-06, Vol.2022, p.1-14 [Periódico revisado por pares]

London: Hindawi

Texto completo disponível

6
Design of a new CP‐ABE with constant‐size secret keys for lightweight devices using elliptic curve cryptography
Material Type:
Artigo
Adicionar ao Meu Espaço

Design of a new CP‐ABE with constant‐size secret keys for lightweight devices using elliptic curve cryptography

Odelu, Vanga ; Das, Ashok Kumar

Security and communication networks, 2016-11, Vol.9 (17), p.4048-4059 [Periódico revisado por pares]

London: Hindawi Limited

Texto completo disponível

7
Lightweight Cryptography for Network-on-Chip Data Encryption
Material Type:
Artigo
Adicionar ao Meu Espaço

Lightweight Cryptography for Network-on-Chip Data Encryption

Ayachi, Riadh ; Mhaouch, Ayoub ; Ben Abdelali, Abdessalem Gope, Prosanta ; Prosanta Gope

Security and communication networks, 2021-05, Vol.2021, p.1-10 [Periódico revisado por pares]

London: Hindawi

Texto completo disponível

8
Research on the Millionaires’ Problem under the Malicious Model Based on the Elliptic Curve Cryptography
Material Type:
Artigo
Adicionar ao Meu Espaço

Research on the Millionaires’ Problem under the Malicious Model Based on the Elliptic Curve Cryptography

Liu, Xin ; Xu, Yang ; Xu, Gang ; Li, Baoshan Huang, Xin-Yi ; Xin-Yi Huang

Security and communication networks, 2022-03, Vol.2022, p.1-11 [Periódico revisado por pares]

London: Hindawi

Texto completo disponível

9
Applied Cryptography and Noise Resistant Data Security
Material Type:
Artigo
Adicionar ao Meu Espaço

Applied Cryptography and Noise Resistant Data Security

Hussain, Iqtadar ; Ahmed, Fawad ; Khokhar, Umar M. ; Anees, Amir

Security and communication networks, 2018-01, Vol.2018, p.1-2 [Periódico revisado por pares]

London: Hindawi

Texto completo disponível

10
An authentication scheme with identity‐based cryptography for M2M security in cyber‐physical systems
Material Type:
Artigo
Adicionar ao Meu Espaço

An authentication scheme with identity‐based cryptography for M2M security in cyber‐physical systems

Chen, Shuo ; Ma, Maode ; Luo, Zhenxing

Security and communication networks, 2016-07, Vol.9 (10), p.1146-1157 [Periódico revisado por pares]

London: Hindawi Limited

Texto completo disponível

Resultados 1 2 3 4 5 next page

Personalize Seus Resultados

  1. Editar

Refine Search Results

Expandir Meus Resultados

  1.   

Refinar Meus Resultados

Assunto 

  1. Cryptography  (745)
  2. Security  (689)
  3. Algorithms  (513)
  4. Privacy  (440)
  5. Encryption  (375)
  6. Communication Networks  (315)
  7. Blockchain  (243)
  8. Authentication  (239)
  9. Internet Of Things  (236)
  10. Cloud Computing  (213)
  11. Access Control  (204)
  12. Communication  (189)
  13. Data Encryption  (162)
  14. Wireless Networks  (151)
  15. Efficiency  (145)
  16. Mais opções open sub menu

Data de Publicação 

De até
  1. Antes de2010  (37)
  2. 2010Até2012  (134)
  3. 2013Até2015  (368)
  4. 2016Até2019  (459)
  5. Após 2019  (571)
  6. Mais opções open sub menu

Buscando em bases de dados remotas. Favor aguardar.