-
161
Intelligent physiological signal infosecurity: Case study in photoplethysmography (PPG) signal
Published 2022-05-01Subjects: Get full text
Article -
162
Efficient certificateless sequential multi-signature scheme
Published 2013-07-01Subjects: “…certificateless cryptography…”
Get full text
Article -
163
A New Trend in Cryptographic Information Security for Industry 5.0: A Systematic Review
Published 2024-01-01Subjects: “…Cryptography…”
Get full text
Article -
164
Evaluation of blended instruction based on network platform in cryptography teaching
Published 2019-06-01Subjects: Get full text
Article -
165
Improved lattice‐based mix‐nets for electronic voting
Published 2023-01-01Subjects: “…lattice‐based post‐quantum cryptography…”
Get full text
Article -
166
Strengthened 32‐bit AES implementation: Architectural error correction configuration with a new voting scheme
Published 2021-11-01Subjects: “…cryptography…”
Get full text
Article -
167
Fare non-repudiation protocol based on identity-based cryptography
Published 2009-01-01Subjects: “…identity-based cryptography…”
Get full text
Article -
168
Leakage-resilient certificateless signcryption scheme
Published 2017-11-01Subjects: Get full text
Article -
169
A Secure and Efficient White-Box Implementation of SM4
Published 2024-12-01Subjects: Get full text
Article -
170
Si Substrate Backside—An Emerging Physical Attack Surface for Secure ICs in Flip Chip Packaging
Published 2024-01-01Subjects: Get full text
Article -
171
Intrusion detection system for V2X communication in VANET networks using machine learning-based cryptographic protocols
Published 2024-12-01Subjects: Get full text
Article -
172
qTrustNet Virtual Private Network (VPN): Enhancing Security in the Quantum Era
Published 2025-01-01Subjects: Get full text
Article -
173
-
174
Design of a Multi-Layer Symmetric Encryption System Using Reversible Cellular Automata
Published 2025-01-01Subjects: Get full text
Article -
175
An improved sunflower optimization algorithm for cluster selection with secured data transmission using cryptographic techniques in WSNS-IoT
Published 2024-01-01Subjects: Get full text
Article -
176
Beyond full‐bit secure authenticated encryption without input‐length limitation
Published 2022-07-01Subjects: Get full text
Article -
177
Unique Information Through the Lens of Channel Ordering: An Introduction and Review
Published 2025-01-01Subjects: “…information-theoretic cryptography…”
Get full text
Article -
178
2D physically unclonable functions of the arbiter type
Published 2023-03-01Subjects: “…physical cryptography…”
Get full text
Article -
179
Privacy-preserving security of IoT networks: A comparative analysis of methods and applications
Published 2025-12-01Subjects: Get full text
Article -
180
ID-based efficient and proactive threshold proxy signature in the standard model
Published 2011-01-01Subjects: Get full text
Article