Go to main content
Formats
Format
BibTeX
MARCXML
TextMARC
MARC
DublinCore
EndNote
NLM
RefWorks
RIS
Cite
Citation

Linked e-resources

Details

Circular Security Reconsidered
Visual Cryptography: Models, Issues, Applications and New Directions
Paper Tigers: An Endless Fight
Security of Identity-based Encryption Schemes from Quadratic Residues
Long-Term Secure One-Round Group Key Establishment from Multilinear Mappings
RSA Weak Public Keys Available on the Internet
A Tweak for a PRF Mode of a Compression Function and Its Applications
May-Ozerov Algorithm for Nearest-Neighbor Problem over mathbb{F}_qandIts Application to Information Set Decoding
A Cryptographic Approach for Implementing Semantic Web's Trust Layer
Schnorr-like Identification Scheme Resistant to Malicious Subliminal Setting of Ephemeral Secret
Homomorphic Encryption Based On Group Algebras and Goldwasser-Micali Scheme
Increasing the Robustness of the Montgomery kP-Algorithm against SCA by Modifying its Initialization
When Pythons Bite
Secure Virtual Machine for Real Time Forensic Tools on Commodity Workstations
Pushing the Optimization Limits of Ring Oscillator-based True Random Number Generators
TOR
Didactic Pluggable Transport
Preparation of SCA Attacks: Successfully Decapsulating BGA Packages
Comparative Analysis of Security Operations Center Architectures; Proposals and Architectural Considerations for Frameworks and Operating Models
Secure Transaction Authentication Protocol
Proposed Scheme for Data Confidentiality and Access Control in Cloud Computing. .

Browse Subjects

Show more subjects...

Statistics

from
to
Export