Search Results

There are 8401 results for: content related to: Cryptographic Mechanisms

  1. You have free access to this content
    References

    Applied Cryptography, Second Edition, 20th Anniversary Edition

    Bruce Schneier, Pages: 675–741, 2015

    Published Online : 9 OCT 2015, DOI: 10.1002/9781119183471.refs

  2. A survey of lightweight stream ciphers for embedded systems

    Security and Communication Networks

    Volume 9, Issue 10, 10 July 2016, Pages: 1226–1246, Charalampos Manifavas, George Hatzivasilis, Konstantinos Fysarakis and Yannis Papaefstathiou

    Version of Record online : 21 DEC 2015, DOI: 10.1002/sec.1399

  3. Lattice-based obfuscation for re-encryption functions

    Security and Communication Networks

    Volume 8, Issue 9, June 2015, Pages: 1648–1658, Rong Cheng and Fangguo Zhang

    Version of Record online : 19 OCT 2014, DOI: 10.1002/sec.1112

  4. Karatsuba–Block-Comb technique for elliptic curve cryptography over binary fields

    Security and Communication Networks

    Volume 8, Issue 17, 25 November 2015, Pages: 3121–3130, Hwajeong Seo, Zhe Liu, Jongseok Choi and Howon Kim

    Version of Record online : 16 MAR 2015, DOI: 10.1002/sec.1237

  5. Cryptographic Approaches for Improving Security and Privacy Issues of RFID Systems

    RFID Systems: Research Trends and Challenges

    Miyako Ohkubo, Koutarou Suzuki, Shingo Kinoshita, Pages: 447–471, 2010

    Published Online : 5 JUL 2010, DOI: 10.1002/9780470665251.ch17

  6. New method of key-dependent message security for asymmetric encryption

    Security and Communication Networks

    Volume 8, Issue 13, 10 September 2015, Pages: 2157–2170, Qiqi Lai, Yupu Hu, Yuan Chen, Baocang Wang and Fenghe Wang

    Version of Record online : 14 NOV 2014, DOI: 10.1002/sec.1160

  7. An Evaluation of Security Standards Implementation in Quantum Key Distribution Systems

    INCOSE International Symposium

    Volume 23, Issue 1, June 2013, Pages: 1475–1486, Carole Harper, Michael R. Grimaila and Gerald Baumgartner

    Version of Record online : 4 NOV 2014, DOI: 10.1002/j.2334-5837.2013.tb03100.x

  8. Design and implementation of a versatile cryptographic unit for RISC processors

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 36–52, Kazim Yumbul, Erkay Savaş, Övünç Kocabaş and Johann Großschädl

    Version of Record online : 10 MAY 2012, DOI: 10.1002/sec.555

  9. Energy efficiency of encryption schemes applied to wireless sensor networks

    Security and Communication Networks

    Volume 5, Issue 7, July 2012, Pages: 789–808, Xueying Zhang, Howard M. Heys and Cheng Li

    Version of Record online : 21 SEP 2011, DOI: 10.1002/sec.375

  10. K08: a generalized BB84/B92 protocol in quantum cryptography

    Security and Communication Networks

    Volume 2, Issue 6, November/December 2009, Pages: 686–693, Stamatios V. Kartalopoulos

    Version of Record online : 14 MAY 2009, DOI: 10.1002/sec.111

  11. A fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment

    Security and Communication Networks

    Volume 4, Issue 5, May 2011, Pages: 487–499, Kai Xi, Tohari Ahmad, Fengling Han and Jiankun Hu

    Version of Record online : 3 DEC 2010, DOI: 10.1002/sec.225

  12. A secure cryptosystem based on affine transformation

    Security and Communication Networks

    Volume 4, Issue 2, February 2011, Pages: 207–215, Mohsen Toorani and Abolfazl Falahati

    Version of Record online : 14 SEP 2009, DOI: 10.1002/sec.137

  13. Practical Cryptographic Civil GPS Signal Authentication

    Navigation

    Volume 59, Issue 3, Fall 2012, Pages: 177–193, K. Wesson, M. Rothlisberger and T. Humphreys

    Version of Record online : 7 SEP 2012, DOI: 10.1002/navi.14

  14. KALwEN: a new practical and interoperable key management scheme for body sensor networks

    Security and Communication Networks

    Volume 4, Issue 11, November 2011, Pages: 1309–1329, Yee Wei Law, Giorgi Moniava, Zheng Gong, Pieter Hartel and Marimuthu Palaniswami

    Version of Record online : 3 DEC 2010, DOI: 10.1002/sec.256

  15. Secure cryptographic functions via virtualization-based outsourced computing

    Concurrency and Computation: Practice and Experience

    Weizhong Qiang, Kang Zhang, Weiqi Dai and Hai Jin

    Version of Record online : 7 OCT 2015, DOI: 10.1002/cpe.3706

  16. Hashing in E-Commerce

    Hashing in Computer Science

    Alan G. Konheim, Pages: 275–306, 2010

    Published Online : 29 JUL 2010, DOI: 10.1002/9780470630617.ch18

  17. Secure broadcast in distributed networks with strong adversaries

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3739–3750, Pawel Szalachowski and Tiffany Hyun-Jin Kim

    Version of Record online : 14 JUL 2015, DOI: 10.1002/sec.1296

  18. Encryption

    Standard Article

    The Internet Encyclopedia

    Ari Juels

    Published Online : 15 APR 2004, DOI: 10.1002/047148296X.tie058

  19. A concurrent key exchange protocol based on commuting matrices

    Concurrency and Computation: Practice and Experience

    Volume 25, Issue 5, 10 April 2013, Pages: 743–751, M. Almulla, A. Kanso and M. Ghebleh

    Version of Record online : 28 JUL 2011, DOI: 10.1002/cpe.1802

  20. A ciphertext-policy attribute-based proxy re-encryption scheme for data sharing in public clouds

    Concurrency and Computation: Practice and Experience

    Volume 27, Issue 8, 10 June 2015, Pages: 2004–2027, Kaitai Liang, Liming Fang, Duncan S. Wong and Willy Susilo

    Version of Record online : 13 OCT 2014, DOI: 10.1002/cpe.3397