-
1
Reconstructing a lightweight security protocol in the radio‐frequency identification systems
Published 2023-07-01Subjects: “…cryptographic protocols…”
Get full text
Article -
2
A combined method of formation of a cryptographic key with secret modification of the results of synchronization of artificial neural networks
Published 2021-10-01Subjects: Get full text
Article -
3
Extended supersingular isogeny Diffie–Hellman key exchange protocol: Revenge of the SIDH
Published 2021-09-01Subjects: “…cryptographic protocols…”
Get full text
Article -
4
-
5
Biometric Fusion for Enhanced Authentication in Cloud Computing Environments
Published 2024-03-01Subjects: Get full text
Article -
6
Private feasible solution determination
Published 2021-01-01Subjects: “…cryptographic protocols…”
Get full text
Article -
7
Generation a shared secret using artificial neural networks
Published 2019-08-01Subjects: Get full text
Article -
8
Optimizing cryptographic protocols against side channel attacks using WGAN-GP and genetic algorithms
Published 2025-01-01Subjects: Get full text
Article -
9
Intelligent two-phase dual authentication framework for Internet of Medical Things
Published 2025-01-01Subjects: Get full text
Article -
10
Service for Verification of Electronic Document’s Certificates
Published 2023-12-01Subjects: Get full text
Article