-
41
-
42
-
43
Development of an extended topology-based lightweight cryptographic scheme for IEEE 802.15.4 wireless sensor networks
Published 2020-10-01“…This article deals with the cryptographic aspects involved in securing wireless sensor networks, in terms of confidentiality and authentication. …”
Get full text
Article -
44
A combined method of formation of a cryptographic key with secret modification of the results of synchronization of artificial neural networks
Published 2021-10-01Subjects: Get full text
Article -
45
Intrusion detection system for V2X communication in VANET networks using machine learning-based cryptographic protocols
Published 2024-12-01“…It uses machine learning-based cryptographic protocols for intrusion detection (ML-CPIDSs). …”
Get full text
Article -
46
A review of quantum communication and information networks with advanced cryptographic applications using machine learning, deep learning techniques
Published 2025-03-01“…QKD methods use quantum physics concepts to establish cryptographic keys, while quantum repeaters compensate for signal loss in fiber optic cables. …”
Get full text
Article -
47
Reconstructing a lightweight security protocol in the radio‐frequency identification systems
Published 2023-07-01Subjects: “…cryptographic protocols…”
Get full text
Article -
48
Extended supersingular isogeny Diffie–Hellman key exchange protocol: Revenge of the SIDH
Published 2021-09-01Subjects: “…cryptographic protocols…”
Get full text
Article -
49
Corrections to “A New Trend in Cryptographic Information Security for Industry 5.0: A Systematic Review”
Published 2024-01-01“…Presents corrections to the paper, (Corrections to “A New Trend in Cryptographic Information Security for Industry 5.0: A Systematic Review”).…”
Get full text
Article -
50
Research on affine equivalence enumeration of the three families vectorial function
Published 2017-11-01Subjects: Get full text
Article -
51
Light block cipher algorithm for electric power industry
Published 2015-12-01Subjects: “…cryptographic technique…”
Get full text
Article -
52
Identity authentication scheme based on identity-based encryption
Published 2016-06-01Subjects: Get full text
Article -
53
-
54
Survey of braid-based cryptography
Published 2009-01-01Subjects: “…cryptographic scheme…”
Get full text
Article -
55
Electronic invoice public verification scheme based on SM2 coalition signature algorithm
Published 2022-04-01Subjects: Get full text
Article -
56
Biometric Fusion for Enhanced Authentication in Cloud Computing Environments
Published 2024-03-01Subjects: Get full text
Article -
57
Provably secure and efficient escrowable public key encryption schemes
Published 2014-07-01Subjects: “…cryptographic algorithm…”
Get full text
Article -
58
Survey on blockchain privacy protection techniques in cryptography
Published 2022-08-01Subjects: Get full text
Article -
59
On access to trusted virtual group under cloud computing
Published 2013-08-01Subjects: Get full text
Article -
60
Private feasible solution determination
Published 2021-01-01Subjects: “…cryptographic protocols…”
Get full text
Article