Treffer 1 - 20
von 1.044
- 1
- 2
Seite in der Trefferliste auswählen
Cryptographic method based on Catalan objects and enumerative chess problem
Distributed Denial of Service Attacks. Dec 09, 2024
Cryptolysis: A Framework for Verification of Optimization Heuristics for the Automated Cryptanalysis of Classical Ciphers and Natural Language Word Segmentation
Mokhov, Serguei A.
2010 Eighth ACIS International Conference on Software Engineering Research, Management and Applications Software Engineering Research, Management and Applications (SERA), 2010 Eighth ACIS International Conference on. :295-302 May, 2010
Cryptography and Cryptanalysis in Java ; Creating and Programming Advanced Algorithms with Java SE 17 LTS and Jakarta EE 10
Nita, Stefania Loredana ; Mihailescu, Marius Iulian
ISBN 9781484281048 9781484281055.
One-Time Pad Cryptography for Secure Data Transmission in IoT Smart Door Using QR Code.
Asrofa, Muhammad Dito ; Bahri, Syamsul ; Kasliono
Jurnal Media Informasi Teknologi; okt2025, Vol. 2 Issue 2, p133-148, 16p
Java Cryptography Architecture
Nita, Stefania Loredana ; Mihailescu, Marius Iulian
Cryptography and Cryptanalysis in Java ; page 55-76 ; ISBN 9798868804403 9798868804410
Secure DNA Cryptosystem for Data Protection in Cloud Storage and Retrieval.
Murugan, Thangavel ; Perumal, Varalakshmi ; Badusha, Nasurudeen Ahamed Noor Mohamed
Computers (2073-431X); Dec2025, Vol. 14 Issue 12, p544, 43p
An efficient practical alternative to ECC by Pell curve cryptography with a new vision.
Elumalai, R. ; Anjaneyulu, G. S. G. N.
Cryptologia; 2026, Vol. 50 Issue 1, p1-41, 41p
HKC-MBLT: Enhancing SaaS transaction security with hybrid cryptography and memory-based lightweight tokenization for IoT-enabled cyber-physical systems.
Okafor, Kennedy Chinedu ; Longe, Omowunmi Mary ; Ezeja, Michael Obinna ; et al.
Cogent Engineering; Dec2025, Vol. 12 Issue 1, p1-33, 33p
Enhancing mobile agent protection using a hybrid security framework combining pretty good protocol and code obfuscation.
Zraqou, Jamal ; Alkhadour, Wesam ; Baklizi, Mahmoud ; et al.
International Journal of Electrical & Computer Engineering (2088-8708); Aug2025, Vol. 15 Issue 4, p3913-3927, 15p
Java Cryptography Architecture
Nita, Stefania Loredana ; Mihailescu, Marius Iulian
Cryptography and Cryptanalysis in Java ; page 29-46 ; ISBN 9781484281048 9781484281055
On the Homomorphic Properties of Kyber and McEliece with Application to Post-Quantum Private Set Intersection.
Abudaqa, Anas A. ; Alshehri, Khaled ; Felemban, Muhamad
Cryptography (2410-387X); Dec2025, Vol. 9 Issue 4, p66, 28p
CAXSS: A Cookie Authentication Scheme Against XSS Attacks for HTTPS.
Shi, Yingjuan ; Ma, Maode ; Wang, Hui
Electronics (2079-9292); Jan2026, Vol. 15 Issue 1, p82, 30p
Elliptic Curve Cryptography and Biometrics for IoT Authentication.
Dargaoui, Souhayla ; Azrour, Mourade ; El Allaoui, Ahmad ; et al.
Serbian Journal of Electrical Engineering; Jun2025, Vol. 22 Issue 2, p223-241, 19p
Achieving Enhanced Efficiency and Security in IoT: A Hybrid Encryption Approach with ECC and Blowfish.
Olamaei, S. A. ; Jezehei, M. Baghaei ; Broumandnia, A.
International Journal of Engineering Transactions B: Applications; May2026, Vol. 39 Issue 5, p1238-1253, 16p
Multilayered digital image encryption approach to resist cryptographic attacks for cybersecurity.
Das, Sanjay ; Jagan, Lotugada ; Singh, Gaurav Kumar ; et al.
PeerJ Computer Science; Oct2025, p1-27, 27p
A secure and energy-efficient authentication framework for the internet of electric things.
Itoo, Samiulla ; Kumar, Vinod ; Ahmad, Musheer
Cluster Computing; Oct2025, Vol. 28 Issue 6, p1-19, 19p
Cryptology as a Way to Teach Advanced Discrete Mathematics.
Bunde, David P. ; Dooley, John F.
Primus: Problems, Resources & Issues in Mathematics Undergraduate Studies; 2024, Vol. 34 Issue 1, p41-53, 13p
A Machine Learning-Based Hybrid Encryption Approach for Securing Messages in Software-Defined Networking.
Pokhrel, Chitran ; Ghimire, Roshani ; Dawadi, Babu R. ; et al.
Network (2673-8732); Mar2025, Vol. 5 Issue 1, p8, 36p
PRIVocular: Enhancing User Privacy Through Air-Gapped Communication Channels.
Bikos, Anastasios N.
Cryptography (2410-387X); Jun2025, Vol. 9 Issue 2, p29, 29p
CRYPTANALYSIS OF ITRU.
Hashim, Hayder R. ; Molnár, Alexandra ; Tengely, Szabolcs
Rad HAZU: Matematicke Znanosti; 2021, Vol. 25, p181-193, 13p
- 1
- 2