Gotowa bibliografia na temat „Proxy public key cryptography”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Proxy public key cryptography”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "Proxy public key cryptography"

1

Chen, Jiahui, Jie Ling, Jianting Ning, et al. "Post quantum proxy signature scheme based on the multivariate public key cryptographic signature." International Journal of Distributed Sensor Networks 16, no. 4 (2020): 155014772091477. http://dx.doi.org/10.1177/1550147720914775.

Pełny tekst źródła
Streszczenie:
Proxy signature is a very useful technique which allows the original signer to delegate the signing capability to a proxy signer to perform the signing operation. It finds wide applications especially in the distributed environment where the entities such as the wireless sensors are short of computational power and needed to be convinced to the authenticity of the server. Due to less proxy signature schemes in the post-quantum cryptography aspect, in this article, we investigate the proxy signature in the post-quantum setting so that it can resist against the potential attacks from the quantum
Style APA, Harvard, Vancouver, ISO itp.
2

K. Sudharani, Ms, and Dr N. K. Sakthivel. "Design and development of a secure certificateless proxy signature based (SE-CLPS) encryption scheme for cloud storage." International Journal of Engineering & Technology 10, no. 1 (2021): 57. http://dx.doi.org/10.14419/ijet.v10i1.21480.

Pełny tekst źródła
Streszczenie:
Certificateless Public Key Cryptography (CL-PKC) scheme is a new standard that combines Identity (ID)-based cryptography and tradi- tional PKC. It yields better security than the ID-based cryptography scheme without requiring digital certificates. In the CL-PKC scheme, as the Key Generation Center (KGC) generates a public key using a partial secret key, the need for authenticating the public key by a trusted third party is avoided. Due to the lack of authentication, the public key associated with the private key of a user may be replaced by anyone. Therefore, the ciphertext cannot be decrypted
Style APA, Harvard, Vancouver, ISO itp.
3

Chadrakala and C. Lingareddy S. "Secure and Efficient Bi-Directional Proxy Re-Encyrption Technique." Indonesian Journal of Electrical Engineering and Computer Science 12, no. 3 (2018): 1143–50. https://doi.org/10.11591/ijeecs.v12.i3.pp1143-1150.

Pełny tekst źródła
Streszczenie:
The low cost availability of smart devices and broadband connection has led to rapid growth of communication over Internet. As of today the internet based communication service is widely used in various application services such as in E-Mail transaction of sensitive data (medical data), online money transaction etc. all these services requires a strong security. There has been continuous ongoing research by various cryptanalyst to enhance security of cryptography especially in semi-untrusted server. However, performance, computation time and ease of use play a significant role in using the alg
Style APA, Harvard, Vancouver, ISO itp.
4

Kim, Won-Bin, Su-Hyun Kim, Daehee Seo, and Im-Yeong Lee. "Broadcast Proxy Reencryption Based on Certificateless Public Key Cryptography for Secure Data Sharing." Wireless Communications and Mobile Computing 2021 (December 16, 2021): 1–16. http://dx.doi.org/10.1155/2021/1567019.

Pełny tekst źródła
Streszczenie:
Broadcast proxy reencryption (BPRE), which combines broadcast encryption (BE) and proxy reencryption (PRE), is a technology used for the redistribution of data uploaded on the cloud to multiple users. BPRE reencrypts data encrypted by the distributor and then uploads it to the cloud into a ciphertext that at a later stage targets multiple recipients. As a result of this, flexible data sharing is possible for multiple recipients. However, various inefficiencies and vulnerabilities of the BE, such as the recipient anonymity problem and the key escrow problem, also creep into BPRE. Our aim in thi
Style APA, Harvard, Vancouver, ISO itp.
5

Wang, Su Li, and Jun Yao Ye. "Applied-Information Technology in Certificateless Proxy Signature Scheme without Bilinear Pairings." Applied Mechanics and Materials 685 (October 2014): 532–35. http://dx.doi.org/10.4028/www.scientific.net/amm.685.532.

Pełny tekst źródła
Streszczenie:
This paper researches on the existing certificateless proxy signature scheme, there is almost no certificateless proxy signature scheme based on discrete logarithm up till now. Combining the knowledge of discrete logarithm over finite field and the advantages of certificateless cryptography, this paper proposes an efficient certificateless proxy signature scheme based on the discrete logarithm without bilinear pairings. To avoid the key escrow problem in the id-based cryptosystem and the saving certificate problem in the traditional public cryptography, meet the good properties of the proxy si
Style APA, Harvard, Vancouver, ISO itp.
6

B M, Chandrakala, and S. C. Linga Reddy. "Secure and Efficient Bi-Directional Proxy Re-Encyrption Technique." Indonesian Journal of Electrical Engineering and Computer Science 12, no. 3 (2018): 1143. http://dx.doi.org/10.11591/ijeecs.v12.i3.pp1143-1150.

Pełny tekst źródła
Streszczenie:
<p><span style="font-size: small;"><span>The low cost availability of smart devices and broadband connection has led to rapid growth of communication over Internet. As of today the internet based communication service is widely used in various application services such as in E-Mail transaction of sensitive data (medical data), online money transaction etc. all these services requires a strong security. There has been continuous ongoing research by various cryptanalyst to enhance security of cryptography especially in semi-untrusted server. However, performance, computation ti
Style APA, Harvard, Vancouver, ISO itp.
7

Mohd, Saiful Adli Mohamad, Din Roshidi, and Ilyani Ahmad Jasmin. "Research trends review on RSA scheme of asymmetric cryptography techniques." Bulletin of Electrical Engineering and Informatics 10, no. 1 (2021): 487–92. https://doi.org/10.11591/eei.v10i1.2493.

Pełny tekst źródła
Streszczenie:
One of the cryptography classifications is asymmetric cryptography, which uses two different keys to encrypt and decrypt the message. This paper discusses a review of RSA scheme of asymmetric cryptography techniques. It is trying to present the domains of RSA scheme used including in public network, wireless sensor network, image encryption, cloud computing, proxy signature, Internet of Things and embedded device, based on the perspective of researchers’ effort in the last decade. Other than that, this paper reviewed the trends and the performance metrics of RSA scheme such as security,
Style APA, Harvard, Vancouver, ISO itp.
8

Wang, Yi. "Structure and Analysis of Certificateless Proxy Blind Signature Scheme without Bilinear Pairing." Advanced Materials Research 734-737 (August 2013): 3194–98. http://dx.doi.org/10.4028/www.scientific.net/amr.734-737.3194.

Pełny tekst źródła
Streszczenie:
Combined with certificateless public key cryptography and proxy blind signature, an efficient certificateless proxy blind signature scheme is proposed. Its security is based on the discrete logarithm problem. Compared with the existed certificateless proxy blind signature scheme, because without bilinear pairing, it have higher efficiency. According to the different attacker and all kinds of attacks, the scheme is proved to be correct and security under the hardness of discrete logarithm problem in the finite field.
Style APA, Harvard, Vancouver, ISO itp.
9

REN, YANLI, DAWU GU, SHUOZHONG WANG, and XINPENGU ZHANG. "HIERARCHICAL IDENTITY-BASED PROXY RE-ENCRYPTION WITHOUT RANDOM ORACLES." International Journal of Foundations of Computer Science 21, no. 06 (2010): 1049–63. http://dx.doi.org/10.1142/s0129054110007726.

Pełny tekst źródła
Streszczenie:
In a proxy re-encryption scheme, a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. A number of solutions have been proposed in public key settings. Hierarchical identity-based cryptography is a generalization of identity-based encryption that mirrors an organizational hierarchy, which allows a root private key generator to distribute the workload by delegating private key generation and identity authentication to lower-level private key generators. In this paper, we propose a hierarchical identity-based proxy re-encryption (
Style APA, Harvard, Vancouver, ISO itp.
10

Mishra, Bharati, Debasish Jena, Ramasubbareddy Somula, and S. Sankar. "Secure Key Storage and Access Delegation Through Cloud Storage." International Journal of Knowledge and Systems Science 11, no. 4 (2020): 45–64. http://dx.doi.org/10.4018/ijkss.2020100104.

Pełny tekst źródła
Streszczenie:
Cloud storage is gaining popularity to store and share files. To secure the files, cloud storage providers supply client interfaces with the facility to encrypt the files and upload them into the cloud. When client-side encryption is done, the onus of key management lies with the cloud user. Public key proxy re-encryption mechanisms can be used to distribute the key among stakeholders of the file. However, clients use low powered devices like mobile phones to share their files. Lightweight cryptography operations are needed to carry out the encryption operations. Ring-LWE-based encryption sche
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Rozprawy doktorskie na temat "Proxy public key cryptography"

1

Möller, Bodo. "Public key cryptography theory and practice /." [S.l. : s.n.], 2003. http://elib.tu-darmstadt.de/diss/000372.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Han, Yong-Fei. "Fast algorithms for public key cryptography." Thesis, Royal Holloway, University of London, 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.244544.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Melin, Tomas, and Tomas Vidhall. "Namecoin as authentication for public-key cryptography." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-108413.

Pełny tekst źródła
Streszczenie:
Public-key cryptography is a subject that is very important to everyone who wants confidentiality and privacy in networks. It is important to understand how public-key cryptography systems work and what flaws they have. In the first part of this report we describe some of the most common encryption schemes and key agreements. We carefully investigate their flaws, if they are broken and what threats have dire consequences. We find that the biggest issue is authentication and we present current solutions to the problem. The current solutions are flawed because they rely too much on trusting diff
Style APA, Harvard, Vancouver, ISO itp.
4

Gaubatz, Gunnar. "Tamper-resistant arithmetic for public-key cryptography." Worcester, Mass. : Worcester Polytechnic Institute, 2007. http://www.wpi.edu/Pubs/ETD/Available/etd-030107-115645/.

Pełny tekst źródła
Streszczenie:
Dissertation (Ph.D.)--Worcester Polytechnic Institute.<br>Keywords: Side Channel Attacks; Fault Attacks; Public-Key Cryptography; Error Detection; Error Detecting Codes. Includes bibliographical references (leaves 127-136).
Style APA, Harvard, Vancouver, ISO itp.
5

Wright, Moriah E. "RSA, Public-Key Cryptography, and Authentication Protocols." Youngstown State University / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=ysu1339297480.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Heindl, Raymond A. "New directions in multivariate public key cryptography." Connect to this title online, 2009. http://etd.lib.clemson.edu/documents/1247508584/.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

McIvor, C. "Algorithms and silicon architectures for public-key cryptography." Thesis, Queen's University Belfast, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.419513.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Ferradi, Houda. "Integrity, authentication and confidentiality in public-key cryptography." Thesis, Paris Sciences et Lettres (ComUE), 2016. http://www.theses.fr/2016PSLEE045/document.

Pełny tekst źródła
Streszczenie:
Cette thèse présente des résultats appartenant aux trois thèmes fondamentaux de la cryptographie à clé publique : l’intégrité, l’authentification et la confidentialité. Au sein de chaque thème nous concevons des nouvelles primitives et améliorons des primitives existantes. Le premier chapitre, dédié à l’intégrité, introduit une preuve non-interactive de génération appropriée de clés publiques RSA et un protocole de co-signature dans lequel tout irrespect de l’équité laisse automatiquement la partie lésée en possession d’une preuve de culpabilité incriminant la partie tricheuse. Le second chapi
Style APA, Harvard, Vancouver, ISO itp.
9

Hettinger, Christopher James. "A New Public-Key Cryptosystem." BYU ScholarsArchive, 2014. https://scholarsarchive.byu.edu/etd/5492.

Pełny tekst źródła
Streszczenie:
Public key cryptosystems offer important advantages over symmetric methods, but the most important such systems rely on the difficulty of integer factorization (or the related discrete logarithm problem). Advances in quantum computing threaten to render such systems useless. In addition, public-key systems tend to be slower than symmetric systems because of their use of number-theoretic algorithms. I propose a new public key system which may be secure against both classical and quantum attacks, while remaining simple and very fast. The system's action is best described in terms of linear algeb
Style APA, Harvard, Vancouver, ISO itp.
10

Gjøsteen, Kristian. "Subgroup membership problems and public key cryptosystems." Doctoral thesis, Norwegian University of Science and Technology, Faculty of Information Technology, Mathematics and Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-128.

Pełny tekst źródła
Streszczenie:
<p>Public key encryption was first proposed by Diffie and Hellman [16], and widely popularised with the RSA cryptosystem [37]. Over the years, the security goals of public key encryption have been studied [17, 22], as have adversary models [30, 36], and many public key cryptosystems have been proposed and analysed.</p><p>It turns out that the security of many of those cryptosystems [16, 18, 22, 29, 34, 35] are based on a common class of mathematical problems, called subgroup membership problems. Cramer and Shoup [10] designed a chosen-ciphertextsecure cryptosystem based on a general subgroup m
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Książki na temat "Proxy public key cryptography"

1

Garrett, Paul, and Daniel Lieman, eds. Public-Key Cryptography. American Mathematical Society, 2005. http://dx.doi.org/10.1090/psapm/062.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Salomaa, Arto. Public-Key Cryptography. Springer Berlin Heidelberg, 1990. http://dx.doi.org/10.1007/978-3-662-02627-4.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Imai, Hideki, and Yuliang Zheng, eds. Public Key Cryptography. Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/bfb0054009.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Batten, Lynn Margaret. Public Key Cryptography. John Wiley & Sons, Inc., 2013. http://dx.doi.org/10.1002/9781118482261.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Naccache, David, and Pascal Paillier, eds. Public Key Cryptography. Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45664-3.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Imai, Hideki, and Yuliang Zheng, eds. Public Key Cryptography. Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/b75033.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Kim, Kwangjo, ed. Public Key Cryptography. Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-44586-2.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Salomaa, Arto. Public-Key Cryptography. Springer Berlin Heidelberg, 1996. http://dx.doi.org/10.1007/978-3-662-03269-5.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Nechvatal, James. Public-key cryptography. U.S. Dept. of Commerce, National Institute of Standards and Technology, 1991.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Nechvatal, James. Public-key cryptography. Computer Systems Laboratory, National Institute of Standards and Technology, U.S. Dept. of Commerce, 1991.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Części książek na temat "Proxy public key cryptography"

1

Bleumer, Gerrit. "Public Key Proxy Encryption." In Encyclopedia of Cryptography and Security. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_217.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Bleumer, Gerrit. "Public Key Proxy Signatures." In Encyclopedia of Cryptography and Security. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_218.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Jakobsson, Markus. "On Quorum Controlled Asymmetric Proxy Re-encryption." In Public Key Cryptography. Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-49162-7_9.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Bleumer, Gerrit. "Public Key Proxy Encryption." In Encyclopedia of Cryptography, Security and Privacy. Springer Berlin Heidelberg, 2023. http://dx.doi.org/10.1007/978-3-642-27739-9_217-2.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Bleumer, Gerrit. "Public Key Proxy Encryption." In Encyclopedia of Cryptography, Security and Privacy. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-030-71522-9_217.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Bleumer, Gerrit. "Public Key Proxy Signatures." In Encyclopedia of Cryptography, Security and Privacy. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-030-71522-9_218.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Döttling, Nico, and Ryo Nishimaki. "Universal Proxy Re-Encryption." In Public-Key Cryptography – PKC 2021. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-75245-3_19.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Fuchsbauer, Georg, Chethan Kamath, Karen Klein, and Krzysztof Pietrzak. "Adaptively Secure Proxy Re-encryption." In Public-Key Cryptography – PKC 2019. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-17259-6_11.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Kirshanova, Elena. "Proxy Re-encryption from Lattices." In Public-Key Cryptography – PKC 2014. Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-54631-0_5.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Shao, Jun, and Zhenfu Cao. "CCA-Secure Proxy Re-encryption without Pairings." In Public Key Cryptography – PKC 2009. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-00468-1_20.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "Proxy public key cryptography"

1

Chen, Lei, Siyuan Ni, Yuyao Wang, Fei Yu, and Yuanhang He. "Content Security Distribution Scheme Based on Certificateless Public Key Cryptography." In 2024 IEEE 12th International Conference on Information, Communication and Networks (ICICN). IEEE, 2024. https://doi.org/10.1109/icicn62625.2024.10761210.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Havanur, Smitha G., and Abey Jacob. "Approach to Post Quantum Cryptography Validation." In 2024 IEEE International Conference on Public Key Infrastructure and its Applications (PKIA). IEEE, 2024. http://dx.doi.org/10.1109/pkia62599.2024.10727560.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Gervais, Mwitende. "Lightweight Certificateless Authenticated Key Agreement Protocol." In 10th International Conference on Artificial Intelligence & Applications. Academy & Industry Research Collaboration Center, 2023. http://dx.doi.org/10.5121/csit.2023.131928.

Pełny tekst źródła
Streszczenie:
Data security and privacy are important to prevent the reveal, modification and unauthorized usage of sensitive information. The introduction of using critical power devices for internet of things (IoTs), e-commerce, e-payment, and wireless sensor networks (WSNs) has brought a new challenge of security due to the low computation capability of sensors. Therefore, the lightweight authenticated key agreement protocols are important to protect their security and privacy. Several researches have been published about authenticated key agreement. However, there is a need of lightweight schemes that c
Style APA, Harvard, Vancouver, ISO itp.
4

Perlner, Ray A., and David A. Cooper. "Quantum resistant public key cryptography." In the 8th Symposium. ACM Press, 2009. http://dx.doi.org/10.1145/1527017.1527028.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Abdulla, Mohamed, and Muhammad Ehsan Rana. "Vulnerabilities in Public Key Cryptography." In 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021). Atlantis Press, 2021. http://dx.doi.org/10.2991/ahis.k.210913.079.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Gupta, Anjali, and Muzzammil Hussain. "Secure Session Key Sharing Using Public Key Cryptography." In the Third International Symposium. ACM Press, 2015. http://dx.doi.org/10.1145/2791405.2791448.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Caboara, Massimo, Fabrizio Caruso, and Carlo Traverso. "Gröbner bases for public key cryptography." In the twenty-first international symposium. ACM Press, 2008. http://dx.doi.org/10.1145/1390768.1390811.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Batina, L., J. Guajardo, T. Kerins, N. Mentens, P. Tuyls, and I. Verbauwhede. "Public-Key Cryptography for RFID-Tags." In Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07). IEEE, 2007. http://dx.doi.org/10.1109/percomw.2007.98.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Boyarsky, Maurizio Kliban. "Public-key cryptography and password protocols." In the 6th ACM conference. ACM Press, 1999. http://dx.doi.org/10.1145/319709.319719.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Coleman, Tom A., James A. Kitchener, David L. Pudney, Kelvin D. Wauchope, and Braden J. Phillips. "An RNS public key cryptography accelerator." In Smart Materials, Nano- and Micro-Smart Systems, edited by Said F. Al-Sarawi. SPIE, 2006. http://dx.doi.org/10.1117/12.695962.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Raporty organizacyjne na temat "Proxy public key cryptography"

1

Nechvatal, James. Public-key cryptography. National Institute of Standards and Technology, 1991. http://dx.doi.org/10.6028/nist.sp.800-2.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

BEAVER, CHERYL L., TIMOTHY J. DRAELOS, VICTORIA A. HAMILTON, et al. Low-Power Public Key Cryptography. Office of Scientific and Technical Information (OSTI), 2000. http://dx.doi.org/10.2172/767206.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Wakid, Shukri. Entity Authentication Using Public Key Cryptography. Defense Technical Information Center, 1997. http://dx.doi.org/10.21236/ada408513.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Turner, S., D. Brown, K. Yiu, R. Housley, and T. Polk. Elliptic Curve Cryptography Subject Public Key Information. RFC Editor, 2009. http://dx.doi.org/10.17487/rfc5480.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Gutmann, P., and C. Bonnell. Standard Public Key Cryptography (PKC) Test Keys. RFC Editor, 2023. http://dx.doi.org/10.17487/rfc9500.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Jonsson, J., and B. Kaliski. Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1. RFC Editor, 2003. http://dx.doi.org/10.17487/rfc3447.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Zhu, L., and B. Tung. Public Key Cryptography for Initial Authentication in Kerberos (PKINIT). RFC Editor, 2006. http://dx.doi.org/10.17487/rfc4556.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Ito, T., and S. Turner. Clarifications for Elliptic Curve Cryptography Subject Public Key Information. RFC Editor, 2020. http://dx.doi.org/10.17487/rfc8813.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Zhu, L., K. Jaganathan, and K. Lauter. Elliptic Curve Cryptography (ECC) Support for Public Key Cryptography for Initial Authentication in Kerberos (PKINIT). RFC Editor, 2008. http://dx.doi.org/10.17487/rfc5349.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Carroll, Thomas, Lindsey Redington, Addison Moran-Schmoker, and Andrew Murray. Inventory of Public Key Cryptography in US Electric Vehicle Charging. Office of Scientific and Technical Information (OSTI), 2023. http://dx.doi.org/10.2172/2204867.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!