„Secure Computing“
Suchergebnisse
616 Treffer
-
An efficient framework for trust evaluation of secure service selection in fog computing based on QoS, reputation, and social criteria
-
Two-party secure semiquantum summation against the collective-dephasing noise
-
Secure device-independent quantum bit-wise XOR summation based on a pseudo-telepathy game
-
A provably secure lightweight authentication protocol in mobile edge computing environments
-
A Secure IoT Applications Allocation Framework for Integrated Fog-Cloud Environment
-
A secure quantum sealed-bid auction protocol based on quantum public key encryption
-
Deterministic secure quantum communication based on spatial encoding
-
An efficient and secure recommendation system based on federated matrix factorization in digital economy
-
A novel ECC-based provably secure and privacy-preserving multi-factor authentication protocol for cloud computing
-
Access control based on entity matching for secure data sharing
-
Secure two-party integer comparison protocol without any third party
-
Secure transmission technique for data in IoT edge computing infrastructure
-
A cost-effective quantum protocol for secure multi-party multiplication
-
Semi-quantum secure direct communication in the curved spacetime
-
On the Security of A Secure Anonymous Identity-Based Scheme in New Authentication Architecture for Mobile Edge Computing
-
Super Secreto - The Third Epoch of Cryptography – Multiple, exponential, quantum-secure and above all, simple and practical Encryption for Everyone
-
Kak’s three-stage protocol of secure quantum communication revisited: hitherto unknown strengths and weaknesses of the protocol
-
A secure and flexible edge computing scheme for AI-driven industrial IoT
-
A secure and efficient authentication scheme in the Internet of Vehicle communication
-
SUPER SECRETO - The Third Epoch of Cryptography – Multiple, exponential, quantum-secure and above all, simple and practical Encryption for Everyone