Synonyms were used for: decryption
Search without synonyms: keywords:(decryption)

1–32 of 32 hits
|

    CryptoKnight:generating and modelling compiled cryptographic primitives

    Free access
    Hill, Gregory / Bellekens, Xavier | BASE | 2018
    Keywords: Cryptography

    Design of a Secure Electric Vehicle Charging Pile Control Device

    Zhai, Feng / Liu, Ying / Fu, Yi Lun | Trans Tech Publications | 2013
    Keywords: Decryption

    IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL

    Free access
    Dinesha H A1 and D.H. Rao2 | BASE | 2018
    Keywords: Cryptography

    Quantum Advantage in Cryptography

    Renner, Renato / Wolf, Ramona | AIAA | 2023
    Keywords: Cryptography , Quantum Cryptography

    An Efficient Authentication Scheme Using Blockchain as a Certificate Authority for the Internet of Drones

    Free access
    Sana Javed / Muhammad Asghar Khan / Ako Muhammad Abdullah et al. | DOAJ | 2022
    Keywords: Elliptic Curve Cryptography , Hyperelliptic Curve Cryptography

    Modelling of satellite constellations for trusted node QKD networks

    Vergoossen, Tom / Loarte, Sergio / Bedington, Robert et al. | Elsevier | 2020
    Keywords: Quantum cryptography

    An HSS‐based robust and lightweight multiple group authentication for ITS towards 5G

    Free access
    Hsu, Chingfang / Harn, Lein / Xia, Zhe | Wiley | 2021
    Keywords: Cryptography

    Using IBC and Chameleon Hash for the Confidentiality and Message Authentication in VANET

    Yein, Alan Dahgwo / Chen, Cheng Yeh / Hsieh, Wen Shyong | Trans Tech Publications | 2012
    Keywords: Identity-Based Cryptography

    Protecting In-Vehicle Services : Security-Enabled SOME/IP Middleware

    Free access
    Iorio Marco / Buttiglieri Alberto / Reineri Massimo et al. | BASE | 2020
    Keywords: Cryptography

    VANETs: Security Challenges and Future Directions

    Free access
    Jared Oluoch | BASE | 2016
    Keywords: cryptography

    Secured and flexible user authentication protocol for wireless sensor network

    P, Prabu / T, Senthilnathan | Emerald Group Publishing | 2020
    Keywords: Cryptography complexity

    Advancing the Security of LDACS

    Free access
    Mäurer, Nils / Gräupl, Thomas / Schmitt, Corinna et al. | German Aerospace Center (DLR) | 2022
    Keywords: Post-Quantum Cryptography

    Secure AIS with Identity-Based Authentication and Encryption

    Free access
    Athanasios Goudosis / Sokratis Katsikas | DOAJ | 2020
    Keywords: cryptography , identity-based cryptography (ibc)

    Orbit design of satellite quantum key distribution constellations in different ground stations networks

    De Grossi, Federico / Alberico, Stefano / Circi, Christian | Elsevier | 2023
    Keywords: Cryptography

    A Resource-Friendly Certificateless Proxy Signcryption Scheme for Drones in Networks beyond 5G

    Free access
    Muhammad Asghar Khan / Hosam Alhakami / Insaf Ullah et al. | DOAJ | 2023
    Keywords: hyperelliptic curve cryptography

    A Security and Privacy Review of VANETs

    Qu, Fengzhong | Online Contents | 2015
    Keywords: Cryptography

    МОДУЛЬ КОМУТАЦІЇ КРИПТОКЛЮЧІВ ДЛЯ ЗАХИЩЕНОЇ СИСТЕМИ ІР-ТЕЛЕФОНІЇ

    Free access
    В.В. Казимир / Є.В. Риндич / Я.Я. Кенійз | DOAJ | 2010
    Keywords: cryptography

    An HSS‐based robust and lightweight multiple group authentication for ITS towards 5G

    Free access
    Chingfang Hsu / Lein Harn / Zhe Xia | DOAJ | 2021
    Keywords: Cryptography

    Cryptographic keys exchange model for smart city applications

    Free access
    Saračević, Muzafer / Adamović, Saša / Maček, Nemanja et al. | Wiley | 2020
    Keywords: cryptography , public key cryptography

      Cryptographic keys exchange model for smart city applications

      Free access
      Saračević, Muzafer / Adamović, Saša / Maček, Nemanja et al. | IET | 2020
      Keywords: public key cryptography , cryptography

    Toward Probabilistic Data Collection in the NOTICE Architecture

    Wang, Xianping | Online Contents | 2016
    Keywords: Cryptography

    SAPSC: SignRecrypting authentication protocol using shareable clouds in VANET groups

    Free access
    Kanchan, Sneha / Singh, Garima / Chaudhari, Narendra S. | IET | 2019
    Keywords: public key cryptography , cryptography

      SAPSC: SignRecrypting authentication protocol using shareable clouds in VANET groups

      Free access
      Kanchan, Sneha / Singh, Garima / Chaudhari, Narendra S. | Wiley | 2019
      Keywords: cryptography , public key cryptography

    Distributed Aggregate Privacy-Preserving Authentication in VANETs

    Zhang, Lei | Online Contents | 2017
    Keywords: Cryptography

    Optical image encryption using interferometry-based phase masks

    Kim, Jong-Yun / Park, Se-Joon / Kim, Cheol-Su et al. | IET Digital Library Archive | 2000
    Keywords: cryptography

    Location information verification using transferable belief model for geographic routing in vehicular ad hoc networks

    Free access
    Sheet, Dalya Khalid / Kaiwartya, Omprakash / Abdullah, Abdul Hanan et al. | Wiley | 2017
    Keywords: cryptography , cryptography based techniques

      Location information verification using transferable belief model for geographic routing in vehicular ad hoc networks

      Free access
      Sheet, Dalya Khalid / Kaiwartya, Omprakash / Abdullah, Abdul Hanan et al. | IET | 2017
      Keywords: cryptography based techniques , cryptography

    Spatial-domain image hiding using image differencing

    Wu, D.C. / Tsai, W.H. | IET Digital Library Archive | 2000
    Keywords: cryptography

    Secure and Privacy-Preserving Smartphone-Based Traffic Information Systems

    Gisdakis, Stylianos | Online Contents | 2015
    Keywords: cryptography

    Cooperative Location Privacy in Vehicular Networks : Why Simple Mix-zones are not Enough

    Free access
    Khodaei, Mohammad / Papadimitratos, Panagiotis | BASE | 2021
    Keywords: Cryptography

    Using bit flips as a source of randomness in cubeSat communication encryption

    Mathews, Melvin | Elsevier | 2020
    Keywords: Cryptography

    Internet of things assisted public security management platform for urban transportation using hybridised cryptographic-integrated steganography

    Free access
    Bi, Dexu / Kadry, Seifedine / Kumar, Priyan Malarvizhi | IET | 2020
    Keywords: cryptography converts data

      Internet of things assisted public security management platform for urban transportation using hybridised cryptographic‐integrated steganography

      Free access
      Bi, Dexu / Kadry, Seifedine / Kumar, Priyan Malarvizhi | Wiley | 2020
      Keywords: cryptography converts data

    GPS Signal Authentication From Cooperative Peers

    Liang Heng | Online Contents | 2015
    Keywords: Cryptography