Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
1769
search results - page 79 / 354
»
Cryptography
Sort
relevance
views
votes
recent
update
View
thumb
title
86
click to vote
IJNSEC
2007
126
views
more
IJNSEC 2007
»
Elliptic Curve Cryptography Based Wireless Authentication Protocol
14 years 9 months ago
Download
ijns.femto.com.tw
Recently, Aydos et al. proposed an ECC-based wireless authentication protocol. Because their protocol is based on ECC, the protocol has significant advantage including lower comp...
Yongliang Liu, Wen Gao, Hongxun Yao, Xinghua Yu
claim paper
Read More »
50
click to vote
TIT
2008
73
views
more
TIT 2008
»
Security Aspects of the Authentication Used in Quantum Cryptography
14 years 9 months ago
Download
www.iqc.ca
Jorgen Cederlof, Jan-Ake Larsson
claim paper
Read More »
63
click to vote
COMPSEC
2002
58
views
more
COMPSEC 2002
»
The gap between cryptography and information security
14 years 9 months ago
Download
www.ebusinessforum.gr
E. Eugene Schultz
claim paper
Read More »
17
click to vote
CSUR
2002
42
views
more
CSUR 2002
»
Some facets of complexity theory and cryptography: A five-lecture tutorial
14 years 9 months ago
Download
ccc.cs.uni-duesseldorf.de
Jörg Rothe
claim paper
Read More »
15
click to vote
IBMRD
2000
38
views
more
IBMRD 2000
»
Cryptography
14 years 9 months ago
Download
www.io.com
Don Coppersmith
claim paper
Read More »
« Prev
« First
page 79 / 354
Last »
Next »