Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Article
|
A Survey on Lightweight Cryptographic Algorithms in IoTCybernetics and information technologies : CIT, 2024-03, Vol.24 (1), p.21-34 [Peer Reviewed Journal]EISSN: 1314-4081 ;DOI: 10.2478/cait-2024-0002Full text available |
|
2 |
Material Type: Article
|
Multi-phase Quantum resistant Framework for Secure Communication in SCADA SystemsIEEE transactions on dependable and secure computing, 2024-03, p.1-18ISSN: 1545-5971 ;EISSN: 1941-0018 ;DOI: 10.1109/TDSC.2024.3378474 ;CODEN: ITDSCMDigital Resources/Online E-Resources |
|
3 |
Material Type: Article
|
Systematic Literature Review on Cloud Computing Security: Threats and Mitigation StrategiesInternational journal of information security, 2024, Vol.15 (2), p.148-167 [Peer Reviewed Journal]Attribution ;ISSN: 1615-5262 ;EISSN: 1615-5270 ;DOI: 10.4236/jis.2024.152010Digital Resources/Online E-Resources |
|
4 |
Material Type: Article
|
Quantum Computing Integrated Patterns for Real-Time Cryptography in Assorted DomainsIEEE access, 2024-05, p.1-1 [Peer Reviewed Journal]EISSN: 2169-3536 ;DOI: 10.1109/ACCESS.2024.3401162 ;CODEN: IAECCGFull text available |
|
5 |
Material Type: Article
|
A survey on lattice-based digital signatureCybersecurity (Singapore), 2024-12, Vol.7 (1), p.7-18 [Peer Reviewed Journal]The Author(s) 2024 ;The Author(s) 2024. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;EISSN: 2523-3246 ;DOI: 10.1186/s42400-023-00198-1Full text available |
|
6 |
Material Type: Article
|
Medical Image Encryption through Chaotic Asymmetric CryptosystemIEEE access, 2024, Vol.12, p.1-1 [Peer Reviewed Journal]Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2024 ;EISSN: 2169-3536 ;DOI: 10.1109/ACCESS.2024.3404088 ;CODEN: IAECCGFull text available |
|
7 |
Material Type: Article
|
Novel design of cryptographic architecture of nanorouter using quantum-dot cellular automata nanotechnologyScientific reports, 2024-05, Vol.14 (1), p.10532-10532 [Peer Reviewed Journal]2024. The Author(s). ;The Author(s) 2024. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;The Author(s) 2024 ;EISSN: 2045-2322 ;DOI: 10.1038/s41598-024-61260-7 ;PMID: 38720092Full text available |
|
8 |
Material Type: Article
|
An Efficient Hardware/Software Co-Design for FALCON on Low-End Embedded SystemsIEEE access, 2024, Vol.12, p.57947-57958 [Peer Reviewed Journal]Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2024 ;EISSN: 2169-3536 ;DOI: 10.1109/ACCESS.2024.3387489 ;CODEN: IAECCGFull text available |
|
9 |
Material Type: Article
|
A Pairing Free Provable Public Key Dual Receiver Encryption SchemeIEEE access, 2024, Vol.12, p.55918-55924 [Peer Reviewed Journal]Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2024 ;EISSN: 2169-3536 ;DOI: 10.1109/ACCESS.2024.3388888 ;CODEN: IAECCGFull text available |
|
10 |
Material Type: Article
|
Password authenticated key exchange-based on Kyber for mobile devicesPeerJ. Computer science, 2024-03, Vol.10, p.e1960-e1960 [Peer Reviewed Journal]2024 Seyhan et al. ;2024 Seyhan et al. 2024 Seyhan et al. ;EISSN: 2376-5992 ;DOI: 10.7717/peerj-cs.1960 ;PMID: 38660167Full text available |
|
11 |
Material Type: Article
|
Methods for using elliptic curves in cryptographyE3S web of conferences, 2024-04, Vol.508, p.05009 [Peer Reviewed Journal]EISSN: 2267-1242 ;DOI: 10.1051/e3sconf/202450805009Full text available |
|
12 |
Material Type: Article
|
Optimal scheduling of blockchain-based virtual power plants considering distribution network congestionJournal of physics. Conference series, 2024-04, Vol.2741 (1), p.012055 [Peer Reviewed Journal]Published under licence by IOP Publishing Ltd. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1742-6588 ;EISSN: 1742-6596 ;DOI: 10.1088/1742-6596/2741/1/012055Full text available |
|
13 |
Material Type: Article
|
Exploiting Small-Norm Polynomial Multiplication with Physical AttacksIACR transactions on cryptographic hardware and embedded systems, 2024-03, Vol.2024 (2) [Peer Reviewed Journal]EISSN: 2569-2925 ;DOI: 10.46586/tches.v2024.i2.359-383Full text available |
|
14 |
Material Type: Article
|
Design and Evaluation of Device Authentication and Secure Communication System with PQC for AIoT EnvironmentsElectronics (Basel), 2024-04, Vol.13 (8), p.1575 [Peer Reviewed Journal]COPYRIGHT 2024 MDPI AG ;2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 2079-9292 ;EISSN: 2079-9292 ;DOI: 10.3390/electronics13081575Full text available |
|
15 |
Material Type: Article
|
ConvKyber: Unleashing the Power of AI Accelerators for Faster Kyber with Novel Iteration-based ApproachesIACR transactions on cryptographic hardware and embedded systems, 2024-03, Vol.2024 (2) [Peer Reviewed Journal]EISSN: 2569-2925 ;DOI: 10.46586/tches.v2024.i2.25-63Full text available |
|
16 |
Material Type: Article
|
Multi-channel polarization manipulation based on graphene for encryption communicationScientific reports, 2024-05, Vol.14 (1), p.11155-11155 [Peer Reviewed Journal]2024. The Author(s). ;The Author(s) 2024. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;The Author(s) 2024 ;EISSN: 2045-2322 ;DOI: 10.1038/s41598-024-61323-9 ;PMID: 38750175Full text available |
|
17 |
Material Type: Article
|
A Systematic Survey on 5G and 6G Security Considerations, Challenges, Trends, and Research AreasFuture internet, 2024-03, Vol.16 (3), p.67 [Peer Reviewed Journal]COPYRIGHT 2024 MDPI AG ;2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1999-5903 ;EISSN: 1999-5903 ;DOI: 10.3390/fi16030067Full text available |
|
18 |
Material Type: Article
|
Secure End-to-End Voice Communication: A Comprehensive Review of Steganography, Modem-based Cryptography, and Chaotic Cryptography TechniquesIEEE access, 2024, Vol.12, p.1-1 [Peer Reviewed Journal]Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2024 ;EISSN: 2169-3536 ;DOI: 10.1109/ACCESS.2024.3405317 ;CODEN: IAECCGFull text available |
|
19 |
Material Type: Article
|
ID-Based Digital Signatures with Security Enhanced ApproachJournal of Telecommunications and Information Technology, 2023-06 (4) [Peer Reviewed Journal]ISSN: 1509-4553 ;EISSN: 1899-8852 ;DOI: 10.26636/jtit.2009.4.1010Full text available |
|
20 |
Material Type: Article
|
A Highly-efficient Lattice-based Post-Quantum Cryptography Processor for IoT ApplicationsIACR transactions on cryptographic hardware and embedded systems, 2024-03, Vol.2024 (2) [Peer Reviewed Journal]EISSN: 2569-2925 ;DOI: 10.46586/tches.v2024.i2.130-153Full text available |