skip to main content
Language:
Search Limited to: Search Limited to: Resource type Show Results with: Show Results with: Search type Index

Results 1 - 20 of 25,390  for All Library Resources

Results 1 2 3 4 5 next page
Refined by: top level: Peer-reviewed Journals remove
Result Number Material Type Add to My Shelf Action Record Details and Options
1
A Solution to Defend Cloud Auditing Protocols from A Potential Attack
Material Type:
Article
Add to My Research

A Solution to Defend Cloud Auditing Protocols from A Potential Attack

Journal of physics. Conference series, 2020-01, Vol.1437 (1), p.12112 [Peer Reviewed Journal]

Published under licence by IOP Publishing Ltd ;2020. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1742-6588 ;EISSN: 1742-6596 ;DOI: 10.1088/1742-6596/1437/1/012112

Full text available

2
A New Method for Differential Cryptanalysis on Addition on Residue Class Ring Z/2 n Z
Material Type:
Article
Add to My Research

A New Method for Differential Cryptanalysis on Addition on Residue Class Ring Z/2 n Z

Journal of physics. Conference series, 2019-03, Vol.1176 (4), p.42019 [Peer Reviewed Journal]

2019. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1742-6588 ;EISSN: 1742-6596 ;DOI: 10.1088/1742-6596/1176/4/042019

Full text available

3
Quantum secret kept for a day
Material Type:
Article
Add to My Research

Quantum secret kept for a day

Nature (London), 2016-10, Vol.538 (7624), p.142-142 [Peer Reviewed Journal]

Copyright Nature Publishing Group Oct 13, 2016 ;ISSN: 0028-0836 ;EISSN: 1476-4687 ;DOI: 10.1038/538142c ;CODEN: NATUAS

Full text available

4
CRYPTOGRAPHY AND STEGANOGRAPHY, METHODS TO HIDE INTELLIGENCE PRODUCTS
Material Type:
Article
Add to My Research

CRYPTOGRAPHY AND STEGANOGRAPHY, METHODS TO HIDE INTELLIGENCE PRODUCTS

Bulletin of "Carol I" National Defense University, 2018-01, Vol.7 (1), p.48 [Peer Reviewed Journal]

2018. This work is published under https://creativecommons.org/licenses/by-nc-sa/4.0/legalcode (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 2284-936X ;EISSN: 2284-9378

Full text available

5
Retracted: Power IoT System Architecture Integrating Trusted Computing and Blockchain
Material Type:
Article
Add to My Research

Retracted: Power IoT System Architecture Integrating Trusted Computing and Blockchain

Wireless communications and mobile computing, 2023-10, Vol.2023, p.1-1 [Peer Reviewed Journal]

Copyright © 2023 Wireless Communications and Mobile Computing. ;Copyright © 2023 Wireless Communications and Mobile Computing. This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1530-8669 ;EISSN: 1530-8677 ;DOI: 10.1155/2023/9851453

Full text available

6
Publisher's Note: “Demonstration of a 6 state-4 state reference frame independent channel for quantum key distribution” [Appl. Phys. Lett. 115, 211103 (2019)]
Material Type:
Article
Add to My Research

Publisher's Note: “Demonstration of a 6 state-4 state reference frame independent channel for quantum key distribution” [Appl. Phys. Lett. 115, 211103 (2019)]

Applied physics letters, 2019-12, Vol.115 (23) [Peer Reviewed Journal]

Author(s) ;2019 Author(s). Published under license by AIP Publishing. ;ISSN: 0003-6951 ;EISSN: 1077-3118 ;DOI: 10.1063/1.5139502 ;CODEN: APPLAB

Full text available

7
Retracted: Digital Identity Verification and Management System of Blockchain-Based Verifiable Certificate with the Privacy Protection of Identity and Behavior
Material Type:
Article
Add to My Research

Retracted: Digital Identity Verification and Management System of Blockchain-Based Verifiable Certificate with the Privacy Protection of Identity and Behavior

Security and communication networks, 2024-01, Vol.2024, p.1-1 [Peer Reviewed Journal]

Copyright © 2024 Security and Communication Networks. ;Copyright © 2024 Security and Communication Networks. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0 ;ISSN: 1939-0114 ;EISSN: 1939-0122 ;DOI: 10.1155/2024/9854035

Full text available

8
Retracted: Blockchain-Based Intelligent Interconnection System Optimization Decision
Material Type:
Article
Add to My Research

Retracted: Blockchain-Based Intelligent Interconnection System Optimization Decision

Security and communication networks, 2024-01, Vol.2024, p.1-1 [Peer Reviewed Journal]

Copyright © 2024 Security and Communication Networks. ;Copyright © 2024 Security and Communication Networks. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0 ;ISSN: 1939-0114 ;EISSN: 1939-0122 ;DOI: 10.1155/2024/9897279

Full text available

9
Breaking Symmetric Cryptosystems Using Quantum Period Finding
Material Type:
Conference Proceeding
Add to My Research

Breaking Symmetric Cryptosystems Using Quantum Period Finding

Distributed under a Creative Commons Attribution 4.0 International License ;DOI: 10.1007/978-3-662-53008-5_8

Digital Resources/Online E-Resources

10
Retracted: Secure Model for IoT Healthcare System under Encrypted Blockchain Framework
Material Type:
Article
Add to My Research

Retracted: Secure Model for IoT Healthcare System under Encrypted Blockchain Framework

Security and communication networks, 2023-10, Vol.2023, p.1-1 [Peer Reviewed Journal]

Copyright © 2023 Security and Communication Networks. ;Copyright © 2023 Security and Communication Networks. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0 ;ISSN: 1939-0114 ;EISSN: 1939-0122 ;DOI: 10.1155/2023/9895719

Full text available

11
Retracted: Revolutionizing E-Commerce Using Blockchain Technology and Implementing Smart Contract
Material Type:
Article
Add to My Research

Retracted: Revolutionizing E-Commerce Using Blockchain Technology and Implementing Smart Contract

Security and communication networks, 2023-10, Vol.2023, p.1-1 [Peer Reviewed Journal]

Copyright © 2023 Security and Communication Networks. ;Copyright © 2023 Security and Communication Networks. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0 ;ISSN: 1939-0114 ;EISSN: 1939-0122 ;DOI: 10.1155/2023/9853410

Full text available

12
Passive BB84 decoy-state protocol with a flawed source
Material Type:
Article
Add to My Research

Passive BB84 decoy-state protocol with a flawed source

Journal of physics. Conference series, 2021-07, Vol.1984 (1), p.12002 [Peer Reviewed Journal]

Published under licence by IOP Publishing Ltd ;2021. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1742-6588 ;EISSN: 1742-6596 ;DOI: 10.1088/1742-6596/1984/1/012002

Full text available

13
On LCD codes over Z 4
Material Type:
Article
Add to My Research

On LCD codes over Z 4

Journal of physics. Conference series, 2021-05, Vol.1850 (1), p.12021 [Peer Reviewed Journal]

Published under licence by IOP Publishing Ltd ;2021. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1742-6588 ;EISSN: 1742-6596 ;DOI: 10.1088/1742-6596/1850/1/012021

Full text available

14
A complete one-way function based on a finite rank free Z x Z-module
Material Type:
Article
Add to My Research

A complete one-way function based on a finite rank free Z x Z-module

Journal of mathematical sciences (New York, N.Y.), 2013-07, Vol.192 (3), p.307 [Peer Reviewed Journal]

COPYRIGHT 2013 Springer ;ISSN: 1072-3374 ;EISSN: 1573-8795

Full text available

15
Secure quantum key distribution
Material Type:
Article
Add to My Research

Secure quantum key distribution

Nature photonics, 2014-08, Vol.8 (8), p.595-604 [Peer Reviewed Journal]

Copyright Nature Publishing Group Aug 2014 ;ISSN: 1749-4885 ;EISSN: 1749-4893 ;DOI: 10.1038/nphoton.2014.149

Full text available

16
Overcoming the rate-distance limit of quantum key distribution without quantum repeaters
Material Type:
Article
Add to My Research

Overcoming the rate-distance limit of quantum key distribution without quantum repeaters

Nature (London), 2018-05, Vol.557 (7705), p.400-403 [Peer Reviewed Journal]

COPYRIGHT 2018 Nature Publishing Group ;COPYRIGHT 2018 Nature Publishing Group ;Copyright Nature Publishing Group May 17, 2018 ;ISSN: 0028-0836 ;EISSN: 1476-4687 ;DOI: 10.1038/s41586-018-0066-6 ;PMID: 29720656

Full text available

17
Improvements of Algebraic Attacks for Solving the Rank Decoding and MinRank Problems
Material Type:
Book Chapter
Add to My Research

Improvements of Algebraic Attacks for Solving the Rank Decoding and MinRank Problems

Distributed under a Creative Commons Attribution 4.0 International License ;DOI: 10.1007/978-3-030-64837-4_17

Digital Resources/Online E-Resources

18
Post-quantum cryptography Algorithm's standardization and performance analysis
Material Type:
Article
Add to My Research

Post-quantum cryptography Algorithm's standardization and performance analysis

Array (New York), 2022-09, Vol.15, p.100242, Article 100242 [Peer Reviewed Journal]

2022 The Author(s) ;ISSN: 2590-0056 ;EISSN: 2590-0056 ;DOI: 10.1016/j.array.2022.100242

Full text available

19
Device-independent quantum key distribution with random key basis
Material Type:
Article
Add to My Research

Device-independent quantum key distribution with random key basis

Nature communications, 2021-05, Vol.12 (1), p.2880-2880, Article 2880 [Peer Reviewed Journal]

The Author(s) 2021. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;The Author(s) 2021 ;ISSN: 2041-1723 ;EISSN: 2041-1723 ;DOI: 10.1038/s41467-021-23147-3 ;PMID: 34001885

Full text available

20
Entanglement distribution over 150 km in wavelength division multiplexed channels for quantum cryptography
Material Type:
Article
Add to My Research

Entanglement distribution over 150 km in wavelength division multiplexed channels for quantum cryptography

Laser & photonics reviews, 2016-05, Vol.10 (3) [Peer Reviewed Journal]

Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 1863-8880 ;EISSN: 1863-8899 ;DOI: 10.1002/lpor.201500258

Digital Resources/Online E-Resources

Results 1 - 20 of 25,390  for All Library Resources

Results 1 2 3 4 5 next page

Personalize your results

  1. Edit

Refine Search Results

Expand My Results

  1.   

Refine My Results

Creation Date 

From To
  1. Before 1981  (19)
  2. 1981 To 1991  (179)
  3. 1992 To 2002  (3,283)
  4. 2003 To 2014  (5,473)
  5. After 2014  (16,684)
  6. More options open sub menu

Resource Type 

  1. Articles  (20,982)
  2. Conference Proceedings  (2,095)
  3. Book Chapters  (1,964)
  4. Books  (211)
  5. Reviews  (119)
  6. magazinearticle  (18)
  7. Datasets  (1)
  8. More options open sub menu

Language 

  1. English  (25,200)
  2. Japanese  (1,333)
  3. Spanish  (76)
  4. Chinese  (61)
  5. Portuguese  (49)
  6. Russian  (41)
  7. French  (37)
  8. German  (25)
  9. Arabic  (20)
  10. Polish  (10)
  11. Ukrainian  (5)
  12. Croatian  (5)
  13. Slovenian  (5)
  14. Persian  (5)
  15. Indonesian  (4)
  16. Czech  (3)
  17. Norwegian  (3)
  18. Italian  (3)
  19. Korean  (3)
  20. Bulgarian  (2)
  21. More options open sub menu

Searching Remote Databases, Please Wait