skip to main content
Language:
Search Limited to: Search Limited to: Resource type Show Results with: Show Results with: Search type Index

Results 1 - 20 of 819,706  for All Library Resources

Results 1 2 3 4 5 next page
Refined by: subject: Cryptography remove
Result Number Material Type Add to My Shelf Action Record Details and Options
1
Long-distance continuous-variable quantum key distribution by controlling excess noise
Material Type:
Article
Add to My Research

Long-distance continuous-variable quantum key distribution by controlling excess noise

Scientific reports, 2016-01, Vol.6 (1), p.19201-19201, Article 19201 [Peer Reviewed Journal]

Copyright Nature Publishing Group Jan 2016 ;Copyright © 2016, Macmillan Publishers Limited 2016 Macmillan Publishers Limited ;ISSN: 2045-2322 ;EISSN: 2045-2322 ;DOI: 10.1038/srep19201 ;PMID: 26758727

Full text available

2
Acceptance Of Ddkoin Blockchain Using Utaut Model: A Customer Perspective Approach
Material Type:
Article
Add to My Research

Acceptance Of Ddkoin Blockchain Using Utaut Model: A Customer Perspective Approach

Calitatea, 2023-01, Vol.24 (192), p.103-121 [Peer Reviewed Journal]

Copyright Romanian Society for Quality Assurance Jan 2023 ;ISSN: 1582-2559 ;DOI: 10.47750/QAS/24.192.13

Full text available

3
MODELING BARRIERS IN THE ADOPTION OF BLOCKCHAIN TECHNOLOGY IN THE INDIAN HEALTHCARE SECTOR: A QUALITATIVE APPROACH
Material Type:
Article
Add to My Research

MODELING BARRIERS IN THE ADOPTION OF BLOCKCHAIN TECHNOLOGY IN THE INDIAN HEALTHCARE SECTOR: A QUALITATIVE APPROACH

International journal of information, business and management, 2023-08, Vol.15 (3), p.105-123

Copyright Educational Research Multimedia & Publications Aug 2023 ;ISSN: 2076-9202 ;EISSN: 2218-046X

Full text available

4
Entropy and Randomness: From Analogic to Quantum World
Material Type:
Article
Add to My Research

Entropy and Randomness: From Analogic to Quantum World

IEEE access, 2020, Vol.8, p.74553-74561 [Peer Reviewed Journal]

Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2020 ;ISSN: 2169-3536 ;EISSN: 2169-3536 ;DOI: 10.1109/ACCESS.2020.2988658 ;CODEN: IAECCG

Full text available

5
Much- needed business digital transformation through big data, internet of things and blockchain capabilities: implications for strategic performance in telecommunication sector
Material Type:
Article
Add to My Research

Much- needed business digital transformation through big data, internet of things and blockchain capabilities: implications for strategic performance in telecommunication sector

Business process management journal, 2021-10, Vol.27 (6), p.1854-1873 [Peer Reviewed Journal]

Emerald Publishing Limited ;Emerald Publishing Limited. ;ISSN: 1463-7154 ;EISSN: 1758-4116 ;DOI: 10.1108/BPMJ-12-2020-0553

Full text available

6
Bell-Type Inequalities from the Perspective of Non-Newtonian Calculus
Material Type:
Article
Add to My Research

Bell-Type Inequalities from the Perspective of Non-Newtonian Calculus

Foundations of science, 2024-06, Vol.29 (2), p.441-457 [Peer Reviewed Journal]

The Author(s) 2022 ;The Author(s) 2022. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1233-1821 ;EISSN: 1572-8471 ;DOI: 10.1007/s10699-022-09866-w

Digital Resources/Online E-Resources

7
Bit Security Estimation for Leakage-Prone Key Establishment Schemes
Material Type:
Article
Add to My Research

Bit Security Estimation for Leakage-Prone Key Establishment Schemes

IEEE communications letters, 2023-07, p.1-1 [Peer Reviewed Journal]

ISSN: 1089-7798 ;EISSN: 1558-2558 ;DOI: 10.1109/LCOMM.2023.3275647 ;CODEN: ICLEF6

Digital Resources/Online E-Resources

8
Cryptanalysis and improvement in an image encryption scheme using combination of the 1D chaotic map
Material Type:
Article
Add to My Research

Cryptanalysis and improvement in an image encryption scheme using combination of the 1D chaotic map

Nonlinear dynamics, 2018-09, Vol.93 (4), p.2399-2413 [Peer Reviewed Journal]

Springer Science+Business Media B.V., part of Springer Nature 2018 ;Copyright Springer Science & Business Media 2018 ;Nonlinear Dynamics is a copyright of Springer, (2018). All Rights Reserved. ;ISSN: 0924-090X ;EISSN: 1573-269X ;DOI: 10.1007/s11071-018-4332-9

Full text available

9
Classical Causal Models for Bell and Kochen-Specker Inequality Violations Require Fine-Tuning
Material Type:
Article
Add to My Research

Classical Causal Models for Bell and Kochen-Specker Inequality Violations Require Fine-Tuning

Physical review. X, 2018-04, Vol.8 (2), p.021018, Article 021018 [Peer Reviewed Journal]

2018. This work is licensed under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 2160-3308 ;EISSN: 2160-3308 ;DOI: 10.1103/PhysRevX.8.021018

Full text available

10
A Deterministic Chaos-Model-Based Gaussian Noise Generator
Material Type:
Article
Add to My Research

A Deterministic Chaos-Model-Based Gaussian Noise Generator

Electronics (Basel), 2024-04, Vol.13 (7), p.1387 [Peer Reviewed Journal]

COPYRIGHT 2024 MDPI AG ;2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 2079-9292 ;EISSN: 2079-9292 ;DOI: 10.3390/electronics13071387

Full text available

11
Encryption technique based on chaotic neural network space shift and color-theory-induced distortion
Material Type:
Article
Add to My Research

Encryption technique based on chaotic neural network space shift and color-theory-induced distortion

Scientific reports, 2022-06, Vol.12 (1), p.10410-10410, Article 10410 [Peer Reviewed Journal]

The Author(s) 2022. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;Attribution ;The Author(s) 2022 ;ISSN: 2045-2322 ;EISSN: 2045-2322 ;DOI: 10.1038/s41598-022-14356-x ;PMID: 35729209

Full text available

12
A Comprehensive Comparison of Multiparty Secure Additions with Differential Privacy
Material Type:
Article
Add to My Research

A Comprehensive Comparison of Multiparty Secure Additions with Differential Privacy

IEEE transactions on dependable and secure computing, 2017-09, Vol.14 (5), p.463-477

Copyright IEEE Computer Society 2017 ;ISSN: 1545-5971 ;EISSN: 1941-0018 ;DOI: 10.1109/TDSC.2015.2484326 ;PMID: 28919841 ;CODEN: ITDSCM

Digital Resources/Online E-Resources

13
A new one-dimensional chaotic map and its application in a novel permutation-less image encryption scheme
Material Type:
Article
Add to My Research

A new one-dimensional chaotic map and its application in a novel permutation-less image encryption scheme

The Visual computer, 2021-07, Vol.37 (7), p.1757-1768 [Peer Reviewed Journal]

Springer-Verlag GmbH Germany, part of Springer Nature 2020 ;Springer-Verlag GmbH Germany, part of Springer Nature 2020. ;ISSN: 0178-2789 ;EISSN: 1432-2315 ;DOI: 10.1007/s00371-020-01936-z

Digital Resources/Online E-Resources

14
Experimental Guesswork with Quantum Side Information Using Twisted Light
Material Type:
Article
Add to My Research

Experimental Guesswork with Quantum Side Information Using Twisted Light

Sensors (Basel, Switzerland), 2023-07, Vol.23 (14), p.6570 [Peer Reviewed Journal]

COPYRIGHT 2023 MDPI AG ;2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;2023 by the authors. 2023 ;ISSN: 1424-8220 ;EISSN: 1424-8220 ;DOI: 10.3390/s23146570 ;PMID: 37514864

Full text available

15
The NFT Hype: What Draws Attention to Non-Fungible Tokens?
Material Type:
Article
Add to My Research

The NFT Hype: What Draws Attention to Non-Fungible Tokens?

Mathematics (Basel), 2022-02, Vol.10 (3), p.335 [Peer Reviewed Journal]

2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 2227-7390 ;EISSN: 2227-7390 ;DOI: 10.3390/math10030335

Full text available

16
A shift coupling digital chaotic model with counteracting dynamical degradation
Material Type:
Article
Add to My Research

A shift coupling digital chaotic model with counteracting dynamical degradation

Nonlinear dynamics, 2023-10, Vol.111 (20), p.19459-19486 [Peer Reviewed Journal]

The Author(s), under exclusive licence to Springer Nature B.V. 2023. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law. ;ISSN: 0924-090X ;EISSN: 1573-269X ;DOI: 10.1007/s11071-023-08853-5

Digital Resources/Online E-Resources

17
Generalized Elias schemes for efficient harvesting of truly random bits
Material Type:
Article
Add to My Research

Generalized Elias schemes for efficient harvesting of truly random bits

International journal of information security, 2018-02, Vol.17 (1), p.67-81 [Peer Reviewed Journal]

Springer-Verlag Berlin Heidelberg 2016 ;International Journal of Information Security is a copyright of Springer, (2016). All Rights Reserved. ;ISSN: 1615-5262 ;EISSN: 1615-5270 ;DOI: 10.1007/s10207-016-0358-5

Full text available

18
Impact of receiver imbalances on the security of continuous variables quantum key distribution
Material Type:
Article
Add to My Research

Impact of receiver imbalances on the security of continuous variables quantum key distribution

EPJ quantum technology, 2021-12, Vol.8 (1), Article 22 [Peer Reviewed Journal]

The Author(s) 2021 ;The Author(s) 2021. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 2662-4400 ;EISSN: 2196-0763 ;DOI: 10.1140/epjqt/s40507-021-00112-z

Full text available

19
Effective Ransomware Detection Using Entropy Estimation of Files for Cloud Services
Material Type:
Article
Add to My Research

Effective Ransomware Detection Using Entropy Estimation of Files for Cloud Services

Sensors (Basel, Switzerland), 2023-03, Vol.23 (6), p.3023 [Peer Reviewed Journal]

COPYRIGHT 2023 MDPI AG ;2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;2023 by the authors. 2023 ;ISSN: 1424-8220 ;EISSN: 1424-8220 ;DOI: 10.3390/s23063023 ;PMID: 36991730

Full text available

20
Sparsity and Privacy in Secret Sharing: A Fundamental Trade-Off
Material Type:
Article
Add to My Research

Sparsity and Privacy in Secret Sharing: A Fundamental Trade-Off

IEEE transactions on information forensics and security, 2024, Vol.19, p.5136-5150 [Peer Reviewed Journal]

ISSN: 1556-6013 ;EISSN: 1556-6021 ;DOI: 10.1109/TIFS.2024.3394256 ;CODEN: ITIFA6

Digital Resources/Online E-Resources

Results 1 - 20 of 819,706  for All Library Resources

Results 1 2 3 4 5 next page

Personalize your results

  1. Edit

Refine Search Results

Expand My Results

  1.   

Refine My Results

Creation Date 

From To
  1. Before 1960  (857)
  2. 1960 To 1975  (10,953)
  3. 1976 To 1991  (76,577)
  4. 1992 To 2008  (276,680)
  5. After 2008  (454,420)
  6. More options open sub menu

Language 

  1. English  (741,440)
  2. Chinese  (157,659)
  3. French  (89,938)
  4. Korean  (61,562)
  5. German  (59,339)
  6. Japanese  (42,927)
  7. Russian  (2,542)
  8. Spanish  (2,149)
  9. Portuguese  (1,578)
  10. Swedish  (696)
  11. Italian  (582)
  12. Finnish  (495)
  13. Dutch  (490)
  14. Danish  (322)
  15. Norwegian  (302)
  16. Polish  (206)
  17. Hungarian  (54)
  18. Czech  (53)
  19. Indonesian  (46)
  20. Ukrainian  (40)
  21. More options open sub menu

Searching Remote Databases, Please Wait