Filters








21 Hits in 2.1 sec

RSA-Based Auto-recoverable Cryptosystems [chapter]

Adam Young, Moti Yung
<span title="">2000</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
We give the first auto-recoverable systems based on RSA (or factoring), whereas the original auto-recoverable auto-certifiable schemes were based on Discrete Logarithm based keys.  ...  The security proof of our system assumes only that RSA is hard, while the original schemes required new specific discrete log based assumptions.  ...  The generic auto-recoverable cryptosystems for factoring/RSA based keys presented here can be used to efficiently implement an arbitrary depth hierarchical key escrow system.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-540-46588-1_22">doi:10.1007/978-3-540-46588-1_22</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/wnuv45rqnfayndbwfipodapvh4">fatcat:wnuv45rqnfayndbwfipodapvh4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180728215718/https://link.springer.com/content/pdf/10.1007%2F978-3-540-46588-1_22.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/5a/53/5a532fe476cf761e22df71deb5a4252ca1848f6b.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-540-46588-1_22"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Page 6320 of Mathematical Reviews Vol. , Issue 2002H [page]

<span title="">2002</span> <i title="American Mathematical Society"> <a target="_blank" rel="noopener" href="https://archive.org/details/pub_mathematical-reviews" style="color: black;">Mathematical Reviews </a> </i> &nbsp;
We give the first auto-recoverable systems based on RSA (or factoring); the original auto-recoverable auto-certifiable schemes were based on discrete logarithm based keys.  ...  {For the entire collection see MR 2002d:68005.} 2002h:94088 94A62 Young, Adam (1-CLMB-C; New York, NY); Yung, Moti RSA-based auto-recoverable cryptosystems.  ... 
<span class="external-identifiers"> </span>
<a target="_blank" rel="noopener" href="https://archive.org/details/sim_mathematical-reviews_2002-08_2002h/page/6320" title="read fulltext microfilm" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Archive [Microfilm] <div class="menu fulltext-thumbnail"> <img src="https://archive.org/serve/sim_mathematical-reviews_2002-08_2002h/__ia_thumb.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a>

Self-Escrowed Public-Key Infrastructures [chapter]

Pascal Paillier, Moti Yung
<span title="">2000</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
We apply this notion to the design of auto-recoverable autocertifiable cryptosystems, a solution to software key escrow due to Young and Yung, and provide a new cryptographic escrow system called selfescrowed  ...  In addition, we give an example of such a system based on ElGamal and Paillier encryption schemes which achieves a high level of both efficiency and security.  ...  Young and Yung [15, 16] recently introduced the concept of auto-recoverable auto-certifiable cryptosystems (ARC), a software-based cryptographic protocol that fulfills most of identified desirable requirements  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/10719994_20">doi:10.1007/10719994_20</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/afkxlod25fbihhepq6d3tg32qi">fatcat:afkxlod25fbihhepq6d3tg32qi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20040725052027/http://www.gemplus.com:80/smart/r_d/publications/pdf/PY00escr.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/08/e8/08e8f57e3b8e24681816db75a265c46639e9c73f.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/10719994_20"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Page 5993 of Mathematical Reviews Vol. , Issue 2000h [page]

<span title="">2000</span> <i title="American Mathematical Society"> <a target="_blank" rel="noopener" href="https://archive.org/details/pub_mathematical-reviews" style="color: black;">Mathematical Reviews </a> </i> &nbsp;
Contents: Victor Shoup and Rosario Gennaro, Securing thresh- old cryptosystems against chosen ciphertext attack (1-16); Adam Young and Moti Yung, Auto-recoverable auto-certifiable cryp- tosystems (17-31  ...  Stern, On the security of RSA padding (1-18); Aviad Kipnis and Adi Shamir, Cryptanalysis of the HFE public key cryptosystem by relinearization (19-30); Phong Nguyen and Jacques Stern, The hardness of the  ... 
<span class="external-identifiers"> </span>
<a target="_blank" rel="noopener" href="https://archive.org/details/sim_mathematical-reviews_2000-08_2000h/page/5993" title="read fulltext microfilm" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Archive [Microfilm] <div class="menu fulltext-thumbnail"> <img src="https://archive.org/serve/sim_mathematical-reviews_2000-08_2000h/__ia_thumb.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a>

Fair Encryption of RSA Keys [chapter]

Guillaume Poupard, Jacques Stern
<span title="">2000</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
In this paper, we propose such proofs of fair encryption for El Gamal and RSA keys, using the Paillier cryptosystem.  ...  In 1998, Young and Yung [29] proposed auto-recoverable auto-certifiable public key cryptosystems based on verifiable encryption of secret keys using double decker exponentiation which makes the proofs  ...  Consequently, this approach is more flexible than auto-recoverable cryptosystems [29] and more secure than binding cryptography [28] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/3-540-45539-6_13">doi:10.1007/3-540-45539-6_13</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/kmaqwgustzd5jowzomwqp2f3xa">fatcat:kmaqwgustzd5jowzomwqp2f3xa</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20150429215101/http://www.iacr.org/archive/eurocrypt2000/1807/18070173-new.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/bb/22/bb22003825b09450d153fc1e44813f90ac19ac13.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/3-540-45539-6_13"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

FPGA-based Digital Quantum Coprocessor

Valerii Hlukhov, Lviv Polytechnic National University, Computer Engineering Department, Bohdan Havano
<span title="2018-11-10">2018</span> <i title="Lviv Polytechnic National University"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/uwy7tdaizjevnjzxzybc555i2i" style="color: black;">Advances in Cyber-Physical Systems</a> </i> &nbsp;
NTRU: A type of lattice based cryptographic public key cipher.  ...  Quantum Computing: A computing device based on Qubits that can run quantum algorithms.  ...  NTRU: The NTRU cryptosystem was proposed by Hoffstein et al. [HPS98] as the first practical lattice-based cryptosystem.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.23939/acps2018.02.067">doi:10.23939/acps2018.02.067</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/7txboogyr5f5vgc5c5zzbovv34">fatcat:7txboogyr5f5vgc5c5zzbovv34</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190803165330/https://www.etsi.org/images/files/ETSIWhitePapers/QuantumSafeWhitepaper.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/27/5f/275f4078126d336563fbdeb92e3ea7eac521d7cb.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.23939/acps2018.02.067"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Page 2679 of Mathematical Reviews Vol. 32, Issue Index [page]

<i title="American Mathematical Society"> <a target="_blank" rel="noopener" href="https://archive.org/details/pub_mathematical-reviews" style="color: black;">Mathematical Reviews </a> </i> &nbsp;
(English summary) (see 2000k:68012) Young, Adam (with Yung, Moti) Auto-recoverable auto-certifiable cryptosystems.  ...  (with Hu, Xiang Ling) A fast generating method for keys of RSA cryptosystems. (Chinese.  ... 
<span class="external-identifiers"> </span>
<a target="_blank" rel="noopener" href="https://archive.org/details/sim_mathematical-reviews_2000_32_index_3/page/2679" title="read fulltext microfilm" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Archive [Microfilm] <div class="menu fulltext-thumbnail"> <img src="https://archive.org/serve/sim_mathematical-reviews_2000_32_index_3/__ia_thumb.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a>

Page 2769 of Mathematical Reviews Vol. , Issue Subject Index [page]

<i title="American Mathematical Society"> <a target="_blank" rel="noopener" href="https://archive.org/details/pub_mathematical-reviews" style="color: black;">Mathematical Reviews </a> </i> &nbsp;
(English summary) (see 2002d:94046) — (with Yung, Moti) RSA-based auto-recoverable cryptosystems.  ...  Why textbook ElGamal and RSA encryption are insecure (extended abstract). (English summary) (see 2002d:94046) Brincat, Karl On the use of RSA as a secret key cryptosystem.  ... 
<span class="external-identifiers"> </span>
<a target="_blank" rel="noopener" href="https://archive.org/details/sim_mathematical-reviews_2002_subject-index_1/page/2769" title="read fulltext microfilm" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Archive [Microfilm] <div class="menu fulltext-thumbnail"> <img src="https://archive.org/serve/sim_mathematical-reviews_2002_subject-index_1/__ia_thumb.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a>

A Survey on Modality Characteristics, Performance Evaluation Metrics, and Security for Traditional and Wearable Biometric Systems [article]

Aditya Sundararajan, Arif I. Sarwat, Alexander Pons
<span title="2019-03-06">2019</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
Since randomness in modality features is hard to achieve for cryptosystems, fuzzy-based extractors using shielding functions, fuzzy commitment, and fuzzy vault schemes were proposed and applied to the  ...  Templates could be alternatively stored separately on smart cards, backed by biometric cryptosystems.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1903.02548v1">arXiv:1903.02548v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/mkl32giawnb5lgornzq4w3ec74">fatcat:mkl32giawnb5lgornzq4w3ec74</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20191022084238/https://arxiv.org/pdf/1903.02548v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/95/dc/95dc9335dab6eebf54466bf47f94cc31eab30ce4.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1903.02548v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Cryptographic Algorithms [chapter]

<span title="2015-10-09">2015</span> <i title="John Wiley &amp; Sons, Inc."> Applied Cryptography, Second Edition </i> &nbsp;
Probably, the best known demonstration of this attack is fault analysis of RSA cryptosystems which use the Chinese Remainder Theorem (CRT).  ...  In timing attacks, the attacker attempts to compromise a cryptosystem by analyzing the time needed to execute cryptographic algorithms.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1002/9781119183471.part3">doi:10.1002/9781119183471.part3</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/rvk3izmftvebbkajuc7xzha6fe">fatcat:rvk3izmftvebbkajuc7xzha6fe</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20150911141453/http://spectrum.library.concordia.ca/974442/1/Zahno_MASC_F2012.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/97/c9/97c9b0bd7acc51de9caf1fa3a3b2bbcba07b4686.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1002/9781119183471.part3"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> wiley.com </button> </a>

Applied cryptography: Protocols, algorithms, and source code in C

<span title="">1994</span> <i title="Elsevier BV"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/6aynyx2i45cmrgrdqsfa7jb2za" style="color: black;">Computer Law and Security Review</a> </i> &nbsp;
Many cryptosystems are based on GF(p), where p is a large prime.  ...  At the time of writing, RSA-100, RSA-110, RSA-120, and RSA-129 have been factored, all using the QS. RSA-130 might be next (using the NFS), or the factoring champions might skip directly to RSA-140.  ...  It uses the RSA algorithm. Bob has a public key, e, a private key, d, and a public modulus, n. Alice wants Bob to sign message m blindly. (1) Alice chooses a random value, k, between 1 and n.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/0267-3649(94)90017-5">doi:10.1016/0267-3649(94)90017-5</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/y5tchirflfdwno7dm4dv6ljx2a">fatcat:y5tchirflfdwno7dm4dv6ljx2a</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180926194146/http://cdn.preterhuman.net/texts/cryptography/Cryptography,%20C%20-%20Applied%20Cryptography%202nd%20Edition%20Protocols,%20Algorthms,%20And%20Source%20Code%20In%20C.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/0267-3649(94)90017-5"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> elsevier.com </button> </a>

Page 2242 of Mathematical Reviews Vol. , Issue Author Index [page]

<i title="American Mathematical Society"> <a target="_blank" rel="noopener" href="https://archive.org/details/pub_mathematical-reviews" style="color: black;">Mathematical Reviews </a> </i> &nbsp;
(Summary) 2002h:94053 94A60 (94A62) — (with Young, Adam) RSA-based auto-recoverable cryptosystems. (English summary) Public key cryptography (Melbourne, 2000), 326-341, Lecture Notes in Comput.  ...  (English summary) Topics in eryptology—CT-RSA 2001 (San Francisco, CA), 208-222, Lecture Notes in Comput. Sci., 2020, Springer, Berlin, 2001. 94A60 Yunin, E. K. (with Sumbatov, A.  ... 
<span class="external-identifiers"> </span>
<a target="_blank" rel="noopener" href="https://archive.org/details/sim_mathematical-reviews_2002_author-index_1/page/2242" title="read fulltext microfilm" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Archive [Microfilm] <div class="menu fulltext-thumbnail"> <img src="https://archive.org/serve/sim_mathematical-reviews_2002_author-index_1/__ia_thumb.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a>

A STUDY ON MULTIPLE METHODS OF FINGERPRINT HASH CODE GENERATION BASED ON MD5 ALGORITHM USING MODIFIED FILTERING TECHNIQUES AND MINUTIAE DETAILS

Krishna Prasad K
<span title="2021-07-28">2021</span> <i title="Zenodo"> Zenodo </i> &nbsp;
A STUDY ON MULTIPLE METHODS OF FINGERPRINT HASH CODE GENERATION BASED ON MD5 ALGORITHM USING MODIFIED FILTERING TECHNIQUES AND MINUTIAE DETAILS - Thesis  ...  Either a public key cryptosystem like RSA (RSA laboratories, 1999) Figure 2 .9.  ...  There are two main drawbacks of biometric innovation, which are biometric features are not recoverable.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.5140714">doi:10.5281/zenodo.5140714</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/steqwl6bcrg3volizjwqk2weuu">fatcat:steqwl6bcrg3volizjwqk2weuu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210730055211/https://zenodo.org/record/5140714/files/Krishna%20Prasad%20Thesis.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/8f/cb/8fcb0f2f4c8be5239a5917f58eb81e73a684d7aa.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.5140714"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> zenodo.org </button> </a>

A user-driven free speech application for anonymous and verified online, public group discourse

Michael Nekrasov, Danny Iland, Miriam Metzger, Lisa Parks, Elizabeth Belding
<span title="2018-11-02">2018</span> <i title="Springer Nature America, Inc"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/bb6biifh2vgodnm4pohs33dggi" style="color: black;">Journal of Internet Services and Applications</a> </i> &nbsp;
We present survey-based research and ethnographic interviews of communities vulnerable to censorship conducted in Zambia, Turkey, and Mongolia between 2013 to 2016.  ...  In the event of password loss, the data are not recoverable.  ...  Despite short lived activities like protests, once users bonded together, they disliked the idea of auto-expiring membership.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1186/s13174-018-0093-4">doi:10.1186/s13174-018-0093-4</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/skndl2ecffailbdm4kz7xr7we4">fatcat:skndl2ecffailbdm4kz7xr7we4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190429001920/https://jisajournal.springeropen.com/track/pdf/10.1186/s13174-018-0093-4" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/71/0e/710e8f6308ad3a086d4f84b5336c39e6bf758619.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1186/s13174-018-0093-4"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> springer.com </button> </a>

2020 Index IEEE Internet of Things Journal Vol. 7

<span title="">2020</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/rkvmqtb3orhy5h6d5ccjzgxej4" style="color: black;">IEEE Internet of Things Journal</a> </i> &nbsp;
., Rateless-Code-Based Secure Cooperative Transmission Scheme for Industrial IoT; JIoT July 2020 6550-6565 Jamalipour, A., see Murali, S., JIoT Jan. 2020 379-388 James, L.A., see Wanasinghe, T.R.,  ...  ., +, JIoT Oct. 2020 9589-9599 R²PEDS: A Recoverable and Revocable Privacy-Preserving Edge Data Sharing Scheme.  ...  Garg, S., +, JIoT May 2020 4598-4606 Cryptography R²PEDS: A Recoverable and Revocable Privacy-Preserving Edge Data Shar- ing Scheme.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/jiot.2020.3046055">doi:10.1109/jiot.2020.3046055</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/wpyblbhkrbcyxpnajhiz5pj74a">fatcat:wpyblbhkrbcyxpnajhiz5pj74a</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210227144352/https://ieeexplore.ieee.org/ielx7/6488907/9290451/09338462.pdf?tp=&amp;arnumber=9338462&amp;isnumber=9290451&amp;ref=" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/jiot.2020.3046055"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 21 results