Search
Selected: A

An Efficient and Publicly Verifiable Id-Based Multi-Signcryption Scheme

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

An Efficient and User Privacy-Preserving Routing Protocol for Wireless Mesh Networks

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

An efficient certificateless authenticated key agreement protocol without bilinear pairings

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

An Efficient Cryptographic Hash Algorithm (BSA)

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

An Efficient Dynamic and Distributed RSA Accumulator

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

An efficient multi-use multi-secret sharing scheme based on hash function

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

An Efficient PKC-Based Security Architecture for Wireless Sensor Networks

Computer Science – Cryptography and Security
Scientific paper

  [ 3.60 ] – good Voters 1   Comments 0

An Efficient Scheme for Sensitive Message Transmission using Blind Signcryption

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

An Efficient Security Mechanism for High-Integrity Wireless Sensor Networks

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

An Efficient Security Mechanism for High-Integrity Wireless Sensor Networks

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

An Elliptic Curve-based Signcryption Scheme with Forward Secrecy

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

An Empirical Study of Spam and Prevention Mechanisms in Online Video Chat Services

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

An Empirical Study of Spam and Spam Vulnerable email Accounts

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

An ensemble approach for feature selection of Cyber Attack Dataset

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

An Epistemic Approach to Coercion-Resistance for Electronic Voting Protocols

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

An equivalence preserving transformation from the Fibonacci to the Galois NLFSRs

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

An Evaluated Certification Services System for the German National Root CA - Legally Binding and Trustworthy Transactions in E-Business and E-Government

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

An Experimental Investigation of Secure Communication With Chaos Masking

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

An Extension for Combination of Duty Constraints in Role-Based Access Control

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

An Identity Based Key Management Scheme in Wireless Sensor Networks

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0
  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.