skip to main content
Language:
Search Limited to: Search Limited to: Resource type Show Results with: Show Results with: Search type Index

Results 1 - 20 of 56,471  for All Library Resources

Results 1 2 3 4 5 next page
Show only
Refined by: New Records: New From Last 3 Month remove
Result Number Material Type Add to My Shelf Action Record Details and Options
1
A Survey on Lightweight Cryptographic Algorithms in IoT
Material Type:
Article
Add to My Research

A Survey on Lightweight Cryptographic Algorithms in IoT

Cybernetics and information technologies : CIT, 2024-03, Vol.24 (1), p.21-34 [Peer Reviewed Journal]

EISSN: 1314-4081 ;DOI: 10.2478/cait-2024-0002

Full text available

2
Multi-phase Quantum resistant Framework for Secure Communication in SCADA Systems
Material Type:
Article
Add to My Research

Multi-phase Quantum resistant Framework for Secure Communication in SCADA Systems

IEEE transactions on dependable and secure computing, 2024-03, p.1-18

ISSN: 1545-5971 ;EISSN: 1941-0018 ;DOI: 10.1109/TDSC.2024.3378474 ;CODEN: ITDSCM

Digital Resources/Online E-Resources

3
Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies
Material Type:
Article
Add to My Research

Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies

International journal of information security, 2024, Vol.15 (2), p.148-167 [Peer Reviewed Journal]

Attribution ;ISSN: 1615-5262 ;EISSN: 1615-5270 ;DOI: 10.4236/jis.2024.152010

Digital Resources/Online E-Resources

4
Quantum Computing Integrated Patterns for Real-Time Cryptography in Assorted Domains
Material Type:
Article
Add to My Research

Quantum Computing Integrated Patterns for Real-Time Cryptography in Assorted Domains

IEEE access, 2024-05, p.1-1 [Peer Reviewed Journal]

EISSN: 2169-3536 ;DOI: 10.1109/ACCESS.2024.3401162 ;CODEN: IAECCG

Full text available

5
A survey on lattice-based digital signature
Material Type:
Article
Add to My Research

A survey on lattice-based digital signature

Cybersecurity (Singapore), 2024-12, Vol.7 (1), p.7-18 [Peer Reviewed Journal]

The Author(s) 2024 ;The Author(s) 2024. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;EISSN: 2523-3246 ;DOI: 10.1186/s42400-023-00198-1

Full text available

6
Medical Image Encryption through Chaotic Asymmetric Cryptosystem
Material Type:
Article
Add to My Research

Medical Image Encryption through Chaotic Asymmetric Cryptosystem

IEEE access, 2024, Vol.12, p.1-1 [Peer Reviewed Journal]

Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2024 ;EISSN: 2169-3536 ;DOI: 10.1109/ACCESS.2024.3404088 ;CODEN: IAECCG

Full text available

7
Novel design of cryptographic architecture of nanorouter using quantum-dot cellular automata nanotechnology
Material Type:
Article
Add to My Research

Novel design of cryptographic architecture of nanorouter using quantum-dot cellular automata nanotechnology

Scientific reports, 2024-05, Vol.14 (1), p.10532-10532 [Peer Reviewed Journal]

2024. The Author(s). ;The Author(s) 2024. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;The Author(s) 2024 ;EISSN: 2045-2322 ;DOI: 10.1038/s41598-024-61260-7 ;PMID: 38720092

Full text available

8
An Efficient Hardware/Software Co-Design for FALCON on Low-End Embedded Systems
Material Type:
Article
Add to My Research

An Efficient Hardware/Software Co-Design for FALCON on Low-End Embedded Systems

IEEE access, 2024, Vol.12, p.57947-57958 [Peer Reviewed Journal]

Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2024 ;EISSN: 2169-3536 ;DOI: 10.1109/ACCESS.2024.3387489 ;CODEN: IAECCG

Full text available

9
A Pairing Free Provable Public Key Dual Receiver Encryption Scheme
Material Type:
Article
Add to My Research

A Pairing Free Provable Public Key Dual Receiver Encryption Scheme

IEEE access, 2024, Vol.12, p.55918-55924 [Peer Reviewed Journal]

Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2024 ;EISSN: 2169-3536 ;DOI: 10.1109/ACCESS.2024.3388888 ;CODEN: IAECCG

Full text available

10
Password authenticated key exchange-based on Kyber for mobile devices
Material Type:
Article
Add to My Research

Password authenticated key exchange-based on Kyber for mobile devices

PeerJ. Computer science, 2024-03, Vol.10, p.e1960-e1960 [Peer Reviewed Journal]

2024 Seyhan et al. ;2024 Seyhan et al. 2024 Seyhan et al. ;EISSN: 2376-5992 ;DOI: 10.7717/peerj-cs.1960 ;PMID: 38660167

Full text available

11
Methods for using elliptic curves in cryptography
Material Type:
Article
Add to My Research

Methods for using elliptic curves in cryptography

E3S web of conferences, 2024-04, Vol.508, p.05009 [Peer Reviewed Journal]

EISSN: 2267-1242 ;DOI: 10.1051/e3sconf/202450805009

Full text available

12
Optimal scheduling of blockchain-based virtual power plants considering distribution network congestion
Material Type:
Article
Add to My Research

Optimal scheduling of blockchain-based virtual power plants considering distribution network congestion

Journal of physics. Conference series, 2024-04, Vol.2741 (1), p.012055 [Peer Reviewed Journal]

Published under licence by IOP Publishing Ltd. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1742-6588 ;EISSN: 1742-6596 ;DOI: 10.1088/1742-6596/2741/1/012055

Full text available

13
Exploiting Small-Norm Polynomial Multiplication with Physical Attacks
Material Type:
Article
Add to My Research

Exploiting Small-Norm Polynomial Multiplication with Physical Attacks

IACR transactions on cryptographic hardware and embedded systems, 2024-03, Vol.2024 (2) [Peer Reviewed Journal]

EISSN: 2569-2925 ;DOI: 10.46586/tches.v2024.i2.359-383

Full text available

14
Design and Evaluation of Device Authentication and Secure Communication System with PQC for AIoT Environments
Material Type:
Article
Add to My Research

Design and Evaluation of Device Authentication and Secure Communication System with PQC for AIoT Environments

Electronics (Basel), 2024-04, Vol.13 (8), p.1575 [Peer Reviewed Journal]

COPYRIGHT 2024 MDPI AG ;2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 2079-9292 ;EISSN: 2079-9292 ;DOI: 10.3390/electronics13081575

Full text available

15
ConvKyber: Unleashing the Power of AI Accelerators for Faster Kyber with Novel Iteration-based Approaches
Material Type:
Article
Add to My Research

ConvKyber: Unleashing the Power of AI Accelerators for Faster Kyber with Novel Iteration-based Approaches

IACR transactions on cryptographic hardware and embedded systems, 2024-03, Vol.2024 (2) [Peer Reviewed Journal]

EISSN: 2569-2925 ;DOI: 10.46586/tches.v2024.i2.25-63

Full text available

16
Multi-channel polarization manipulation based on graphene for encryption communication
Material Type:
Article
Add to My Research

Multi-channel polarization manipulation based on graphene for encryption communication

Scientific reports, 2024-05, Vol.14 (1), p.11155-11155 [Peer Reviewed Journal]

2024. The Author(s). ;The Author(s) 2024. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;The Author(s) 2024 ;EISSN: 2045-2322 ;DOI: 10.1038/s41598-024-61323-9 ;PMID: 38750175

Full text available

17
A Systematic Survey on 5G and 6G Security Considerations, Challenges, Trends, and Research Areas
Material Type:
Article
Add to My Research

A Systematic Survey on 5G and 6G Security Considerations, Challenges, Trends, and Research Areas

Future internet, 2024-03, Vol.16 (3), p.67 [Peer Reviewed Journal]

COPYRIGHT 2024 MDPI AG ;2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1999-5903 ;EISSN: 1999-5903 ;DOI: 10.3390/fi16030067

Full text available

18
Secure End-to-End Voice Communication: A Comprehensive Review of Steganography, Modem-based Cryptography, and Chaotic Cryptography Techniques
Material Type:
Article
Add to My Research

Secure End-to-End Voice Communication: A Comprehensive Review of Steganography, Modem-based Cryptography, and Chaotic Cryptography Techniques

IEEE access, 2024, Vol.12, p.1-1 [Peer Reviewed Journal]

Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2024 ;EISSN: 2169-3536 ;DOI: 10.1109/ACCESS.2024.3405317 ;CODEN: IAECCG

Full text available

19
ID-Based Digital Signatures with Security Enhanced Approach
Material Type:
Article
Add to My Research

ID-Based Digital Signatures with Security Enhanced Approach

Journal of Telecommunications and Information Technology, 2023-06 (4) [Peer Reviewed Journal]

ISSN: 1509-4553 ;EISSN: 1899-8852 ;DOI: 10.26636/jtit.2009.4.1010

Full text available

20
A Highly-efficient Lattice-based Post-Quantum Cryptography Processor for IoT Applications
Material Type:
Article
Add to My Research

A Highly-efficient Lattice-based Post-Quantum Cryptography Processor for IoT Applications

IACR transactions on cryptographic hardware and embedded systems, 2024-03, Vol.2024 (2) [Peer Reviewed Journal]

EISSN: 2569-2925 ;DOI: 10.46586/tches.v2024.i2.130-153

Full text available

Results 1 - 20 of 56,471  for All Library Resources

Results 1 2 3 4 5 next page

Personalize your results

  1. Edit

Refine Search Results

Expand My Results

  1.   

Show only

  1. Peer-reviewed Journals (326)

Refine My Results

Creation Date 

From To
  1. Before 1973  (17)
  2. 1973 To 1985  (646)
  3. 1986 To 1997  (643)
  4. 1998 To 2010  (778)
  5. After 2010  (54,361)
  6. More options open sub menu

Language 

  1. English  (32,282)
  2. Chinese  (30,529)
  3. Japanese  (5,434)
  4. French  (4,799)
  5. Korean  (4,427)
  6. German  (2,677)
  7. Italian  (1,119)
  8. Portuguese  (244)
  9. Spanish  (218)
  10. Hungarian  (143)
  11. Polish  (127)
  12. Swedish  (21)
  13. Dutch  (20)
  14. Hebrew  (20)
  15. Russian  (14)
  16. Finnish  (14)
  17. Danish  (13)
  18. Bulgarian  (10)
  19. Croatian  (8)
  20. More options open sub menu

Searching Remote Databases, Please Wait