Search
Selected: All

Efficiency of Biometric integration with Salt Value at an Enterprise Level and Data Centres

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Efficient and Cryptographically Secure Generation of Chaotic Pseudorandom Numbers on GPU

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Efficient and Dynamic Group Key Agreement in Ad hoc Networks

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Efficient and Robust Secure Aggregation for Sensor Networks

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Efficient and Spontaneous Privacy-Preserving Protocol for Secure Vehicular Communications

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Efficient Authenticated Data Structures for Graph Connectivity and Geometric Search Problems

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Efficient Authenticated Encryption Schemes with Public Verifiability

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Efficient Defence against Misbehaving TCP Receiver DoS Attacks

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Efficient Detection of Sybil Attack Based on Cryptography in Vanet

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Efficient FPGA-based multipliers for F_{3^97} and F_{3^{6*97}}

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Efficient Identity Based Public Verifiable Signcryption Scheme

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Efficient Implementation of Elliptic Curve Cryptography Using Low-power Digital Signal Processor

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Efficient linear feedback shift registers with maximal period

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Efficient methodology for implementation of Encrypted File System in User Space

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Efficient Password-Typed Key Agreement Scheme

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Efficient Privacy-Preserving Authentication Protocol for Vehicular Communications with Trustworthy

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Efficient Steganography with Provable Security Guarantees

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Efficient, Differentially Private Point Estimators

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Electronic Authority Variation

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Elliptic Curve Based Zero Knowledge Proofs and Their Applicability on Resource Constrained Devices

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0
  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.