Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Article
|
A Solution to Defend Cloud Auditing Protocols from A Potential AttackJournal of physics. Conference series, 2020-01, Vol.1437 (1), p.12112 [Peer Reviewed Journal]Published under licence by IOP Publishing Ltd ;2020. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1742-6588 ;EISSN: 1742-6596 ;DOI: 10.1088/1742-6596/1437/1/012112Full text available |
|
2 |
Material Type: Article
|
A New Method for Differential Cryptanalysis on Addition on Residue Class Ring Z/2 n ZJournal of physics. Conference series, 2019-03, Vol.1176 (4), p.42019 [Peer Reviewed Journal]2019. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1742-6588 ;EISSN: 1742-6596 ;DOI: 10.1088/1742-6596/1176/4/042019Full text available |
|
3 |
Material Type: Article
|
Quantum secret kept for a dayNature (London), 2016-10, Vol.538 (7624), p.142-142 [Peer Reviewed Journal]Copyright Nature Publishing Group Oct 13, 2016 ;ISSN: 0028-0836 ;EISSN: 1476-4687 ;DOI: 10.1038/538142c ;CODEN: NATUASFull text available |
|
4 |
Material Type: Article
|
CRYPTOGRAPHY AND STEGANOGRAPHY, METHODS TO HIDE INTELLIGENCE PRODUCTSBulletin of "Carol I" National Defense University, 2018-01, Vol.7 (1), p.48 [Peer Reviewed Journal]2018. This work is published under https://creativecommons.org/licenses/by-nc-sa/4.0/legalcode (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 2284-936X ;EISSN: 2284-9378Full text available |
|
5 |
Material Type: Article
|
Retracted: Power IoT System Architecture Integrating Trusted Computing and BlockchainWireless communications and mobile computing, 2023-10, Vol.2023, p.1-1 [Peer Reviewed Journal]Copyright © 2023 Wireless Communications and Mobile Computing. ;Copyright © 2023 Wireless Communications and Mobile Computing. This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1530-8669 ;EISSN: 1530-8677 ;DOI: 10.1155/2023/9851453Full text available |
|
6 |
Material Type: Article
|
Publisher's Note: “Demonstration of a 6 state-4 state reference frame independent channel for quantum key distribution” [Appl. Phys. Lett. 115, 211103 (2019)]Applied physics letters, 2019-12, Vol.115 (23) [Peer Reviewed Journal]Author(s) ;2019 Author(s). Published under license by AIP Publishing. ;ISSN: 0003-6951 ;EISSN: 1077-3118 ;DOI: 10.1063/1.5139502 ;CODEN: APPLABFull text available |
|
7 |
Material Type: Article
|
Retracted: Digital Identity Verification and Management System of Blockchain-Based Verifiable Certificate with the Privacy Protection of Identity and BehaviorSecurity and communication networks, 2024-01, Vol.2024, p.1-1 [Peer Reviewed Journal]Copyright © 2024 Security and Communication Networks. ;Copyright © 2024 Security and Communication Networks. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0 ;ISSN: 1939-0114 ;EISSN: 1939-0122 ;DOI: 10.1155/2024/9854035Full text available |
|
8 |
Material Type: Article
|
Retracted: Blockchain-Based Intelligent Interconnection System Optimization DecisionSecurity and communication networks, 2024-01, Vol.2024, p.1-1 [Peer Reviewed Journal]Copyright © 2024 Security and Communication Networks. ;Copyright © 2024 Security and Communication Networks. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0 ;ISSN: 1939-0114 ;EISSN: 1939-0122 ;DOI: 10.1155/2024/9897279Full text available |
|
9 |
Material Type: Conference Proceeding
|
Breaking Symmetric Cryptosystems Using Quantum Period FindingDistributed under a Creative Commons Attribution 4.0 International License ;DOI: 10.1007/978-3-662-53008-5_8Digital Resources/Online E-Resources |
|
10 |
Material Type: Article
|
Retracted: Secure Model for IoT Healthcare System under Encrypted Blockchain FrameworkSecurity and communication networks, 2023-10, Vol.2023, p.1-1 [Peer Reviewed Journal]Copyright © 2023 Security and Communication Networks. ;Copyright © 2023 Security and Communication Networks. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0 ;ISSN: 1939-0114 ;EISSN: 1939-0122 ;DOI: 10.1155/2023/9895719Full text available |
|
11 |
Material Type: Article
|
Retracted: Revolutionizing E-Commerce Using Blockchain Technology and Implementing Smart ContractSecurity and communication networks, 2023-10, Vol.2023, p.1-1 [Peer Reviewed Journal]Copyright © 2023 Security and Communication Networks. ;Copyright © 2023 Security and Communication Networks. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0 ;ISSN: 1939-0114 ;EISSN: 1939-0122 ;DOI: 10.1155/2023/9853410Full text available |
|
12 |
Material Type: Article
|
Passive BB84 decoy-state protocol with a flawed sourceJournal of physics. Conference series, 2021-07, Vol.1984 (1), p.12002 [Peer Reviewed Journal]Published under licence by IOP Publishing Ltd ;2021. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1742-6588 ;EISSN: 1742-6596 ;DOI: 10.1088/1742-6596/1984/1/012002Full text available |
|
13 |
Material Type: Article
|
On LCD codes over Z 4Journal of physics. Conference series, 2021-05, Vol.1850 (1), p.12021 [Peer Reviewed Journal]Published under licence by IOP Publishing Ltd ;2021. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1742-6588 ;EISSN: 1742-6596 ;DOI: 10.1088/1742-6596/1850/1/012021Full text available |
|
14 |
Material Type: Article
|
A complete one-way function based on a finite rank free Z x Z-moduleJournal of mathematical sciences (New York, N.Y.), 2013-07, Vol.192 (3), p.307 [Peer Reviewed Journal]COPYRIGHT 2013 Springer ;ISSN: 1072-3374 ;EISSN: 1573-8795Full text available |
|
15 |
Material Type: Article
|
Secure quantum key distributionNature photonics, 2014-08, Vol.8 (8), p.595-604 [Peer Reviewed Journal]Copyright Nature Publishing Group Aug 2014 ;ISSN: 1749-4885 ;EISSN: 1749-4893 ;DOI: 10.1038/nphoton.2014.149Full text available |
|
16 |
Material Type: Article
|
Overcoming the rate-distance limit of quantum key distribution without quantum repeatersNature (London), 2018-05, Vol.557 (7705), p.400-403 [Peer Reviewed Journal]COPYRIGHT 2018 Nature Publishing Group ;COPYRIGHT 2018 Nature Publishing Group ;Copyright Nature Publishing Group May 17, 2018 ;ISSN: 0028-0836 ;EISSN: 1476-4687 ;DOI: 10.1038/s41586-018-0066-6 ;PMID: 29720656Full text available |
|
17 |
Material Type: Book Chapter
|
Improvements of Algebraic Attacks for Solving the Rank Decoding and MinRank ProblemsDistributed under a Creative Commons Attribution 4.0 International License ;DOI: 10.1007/978-3-030-64837-4_17Digital Resources/Online E-Resources |
|
18 |
Material Type: Article
|
Post-quantum cryptography Algorithm's standardization and performance analysisArray (New York), 2022-09, Vol.15, p.100242, Article 100242 [Peer Reviewed Journal]2022 The Author(s) ;ISSN: 2590-0056 ;EISSN: 2590-0056 ;DOI: 10.1016/j.array.2022.100242Full text available |
|
19 |
Material Type: Article
|
Device-independent quantum key distribution with random key basisNature communications, 2021-05, Vol.12 (1), p.2880-2880, Article 2880 [Peer Reviewed Journal]The Author(s) 2021. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;The Author(s) 2021 ;ISSN: 2041-1723 ;EISSN: 2041-1723 ;DOI: 10.1038/s41467-021-23147-3 ;PMID: 34001885Full text available |
|
20 |
Material Type: Article
|
Entanglement distribution over 150 km in wavelength division multiplexed channels for quantum cryptographyLaser & photonics reviews, 2016-05, Vol.10 (3) [Peer Reviewed Journal]Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 1863-8880 ;EISSN: 1863-8899 ;DOI: 10.1002/lpor.201500258Digital Resources/Online E-Resources |