skip to main content
Resultados 1 2 3 4 5 next page
Refinado por: Nome da Publicação: Security And Communication Networks remover assunto: Technology remover
Result Number Material Type Add to My Shelf Action Record Details and Options
1
Privacy‐preserving multi‐receiver signcryption scheme for heterogeneous systems
Material Type:
Artigo
Adicionar ao Meu Espaço

Privacy‐preserving multi‐receiver signcryption scheme for heterogeneous systems

Li, Yahong ; Wang, Caifen ; Zhang, Yulei ; Niu, Shufen

Security and communication networks, 2016-11, Vol.9 (17), p.4574-4584 [Periódico revisado por pares]

Chichester, UK: John Wiley & Sons, Ltd

Texto completo disponível

2
Provably secure user authentication and key agreement scheme for wireless sensor networks
Material Type:
Artigo
Adicionar ao Meu Espaço

Provably secure user authentication and key agreement scheme for wireless sensor networks

Das, Ashok Kumar ; Kumari, Saru ; Odelu, Vanga ; Li, Xiong ; Wu, Fan ; Huang, Xinyi

Security and communication networks, 2016-11, Vol.9 (16), p.3670-3687 [Periódico revisado por pares]

London: Hindawi Limited

Texto completo disponível

3
Anonymous and provably secure certificateless multireceiver encryption without bilinear pairing
Material Type:
Artigo
Adicionar ao Meu Espaço

Anonymous and provably secure certificateless multireceiver encryption without bilinear pairing

Islam, SK Hafizul ; Khan, Muhammad Khurram ; Al-Khouri, Ali M.

Security and communication networks, 2015-09, Vol.8 (13), p.2214-2231 [Periódico revisado por pares]

London: Blackwell Publishing Ltd

Texto completo disponível

4
A fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment
Material Type:
Artigo
Adicionar ao Meu Espaço

A fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment

Xi, Kai ; Ahmad, Tohari ; Han, Fengling ; Hu, Jiankun

Security and communication networks, 2011-05, Vol.4 (5), p.487-499 [Periódico revisado por pares]

Chichester, UK: John Wiley & Sons, Ltd

Texto completo disponível

5
Performance Analysis of Hyperledger Fabric Platforms
Material Type:
Artigo
Adicionar ao Meu Espaço

Performance Analysis of Hyperledger Fabric Platforms

Nasir, Qassim ; Qasse, Ilham A. ; Abu Talib, Manar ; Nassif, Ali Bou Megias, David ; David Megias

Security and communication networks, 2018-01, Vol.2018, p.1-14 [Periódico revisado por pares]

London: Hindawi

Texto completo disponível

6
A survey of lightweight stream ciphers for embedded systems
Material Type:
Artigo
Adicionar ao Meu Espaço

A survey of lightweight stream ciphers for embedded systems

Manifavas, Charalampos ; Hatzivasilis, George ; Fysarakis, Konstantinos ; Papaefstathiou, Yannis

Security and communication networks, 2016-07, Vol.9 (10), p.1226-1246 [Periódico revisado por pares]

London: Hindawi Limited

Texto completo disponível

7
Quantum Cryptography for the Future Internet and the Security Analysis
Material Type:
Artigo
Adicionar ao Meu Espaço

Quantum Cryptography for the Future Internet and the Security Analysis

Zhou, Tianqi ; Shen, Jian ; Li, Xiong ; Wang, Chen ; Shen, Jun Wang, Guojun ; Guojun Wang

Security and communication networks, 2018-01, Vol.2018, p.1-7 [Periódico revisado por pares]

London: Hindawi

Texto completo disponível

8
A Survey of How to Use Blockchain to Secure Internet of Things and the Stalker Attack
Material Type:
Artigo
Adicionar ao Meu Espaço

A Survey of How to Use Blockchain to Secure Internet of Things and the Stalker Attack

Jesus, Emanuel Ferreira ; Chicarino, Vanessa R. L. ; de Albuquerque, Célio V. N. ; Rocha, Antônio A. de A. Gómez Mármol, Félix ; Félix Gómez Mármol

Security and communication networks, 2018-01, Vol.2018, p.1-27 [Periódico revisado por pares]

London: Hindawi

Texto completo disponível

9
Karatsuba-Block-Comb technique for elliptic curve cryptography over binary fields
Material Type:
Artigo
Adicionar ao Meu Espaço

Karatsuba-Block-Comb technique for elliptic curve cryptography over binary fields

Seo, Hwajeong ; Liu, Zhe ; Choi, Jongseok ; Kim, Howon

Security and communication networks, 2015-11, Vol.8 (17), p.3121-3130 [Periódico revisado por pares]

London: Blackwell Publishing Ltd

Texto completo disponível

10
Security bootstrapping of mobile ad hoc networks using identity‐based cryptography
Material Type:
Artigo
Adicionar ao Meu Espaço

Security bootstrapping of mobile ad hoc networks using identity‐based cryptography

Adli Mehr, Kamal ; Musevi Niya, Javad

Security and communication networks, 2016-07, Vol.9 (11), p.1374-1383 [Periódico revisado por pares]

London: Hindawi Limited

Texto completo disponível

Resultados 1 2 3 4 5 next page

Buscando em bases de dados remotas. Favor aguardar.