Applications of Blockchain Technology in Medicine and Healthcare: Challenges and Future Perspectives | 2019/01/02 | English | 158 |
Multi-Factor Authentication: A Survey | 2018/01/05 | English | 101 |
QUARC: Quantum Research Cubesat—A Constellation for Quantum Communication | 2020/02/27 | English | 34 |
Provably Secure Covert Communication on Blockchain | 2018/08/20 | English | 34 |
Power Side-Channel Attack Analysis: A Review of 20 Years of Study for the Layman | 2020/05/19 | English | 32 |
Beyond Bitcoin: A Critical Look at Blockchain-Based Systems | 2017/09/01 | English | 29 |
A Privacy-Preserving, Mutual PUF-Based Authentication Protocol | 2016/11/25 | English | 26 |
A Taxonomy of Blockchain Consensus Methods | 2020/11/19 | English | 25 |
Multiparty Delegated Quantum Computing | 2017/07/30 | English | 24 |
A Novel Algorithm of Constructing Highly Nonlinear S-p-boxes | 2019/01/16 | English | 24 |
An Enhanced Key Management Scheme for LoRaWAN | 2018/11/02 | English | 24 |
Cryptography in Wireless Multimedia Sensor Networks: A Survey and Research Directions | 2017/01/05 | English | 18 |
A Simple Protocol for Certifying Graph States and Applications in Quantum Networks | 2020/01/22 | English | 18 |
Benchmark Analysis of YOLO Performance on Edge Intelligence Devices | 2022/04/01 | English | 17 |
Efficient One-Time Signatures from Quasi-Cyclic Codes: A Full Treatment | 2018/10/12 | English | 15 |
A Novel Ultra-Compact FPGA PUF: The DD-PUF | 2021/09/08 | English | 14 |
Why Is Deep Learning Challenging for Printed Circuit Board (PCB) Component Recognition and How Can We Address It? | 2021/03/01 | English | 14 |
FPGA Implementation of a Cryptographically-Secure PUF Based on Learning Parity with Noise | 2017/12/09 | English | 13 |
Privacy Protection in Real Time HEVC Standard Using Chaotic System | 2020/06/24 | English | 13 |
Pairing Free Identity-Based Blind Signature Scheme with Message Recovery | 2018/10/09 | English | 13 |
A Searchable Encryption Scheme with Biometric Authentication and Authorization for Cloud Environments | 2022/02/14 | English | 12 |
Variations of QKD Protocols Based on Conventional System Measurements: A Literature Review | 2022/03/04 | English | 12 |
On General Data Protection Regulation Vulnerabilities and Privacy Issues, for Wearable Devices and Fitness Tracking Applications | 2021/10/18 | English | 12 |
A Review of Blockchain in Fintech: Taxonomy, Challenges, and Future Directions | 2022/04/19 | English | 11 |
Cryptanalysis and Improvement of ECC Based Authentication and Key Exchanging Protocols | 2017/06/13 | English | 11 |
Security Analysis of Lightweight IoT Cipher: Chaskey | 2020/08/05 | English | 11 |
Analysis of Entropy in a Hardware-Embedded Delay PUF | 2017/06/07 | English | 10 |
Cryptanalysis of Round-Reduced Fantomas, Robin and iSCREAM | 2019/01/10 | English | 10 |
Light Weight Authentication Scheme for Smart Home IoT Devices | 2022/07/20 | English | 9 |
Synchronization in Quantum Key Distribution Systems | 2017/10/31 | English | 9 |