共 50 条
- [2] Data protection techniques, cryptographic protocols and PKI systems in modern computer networks [J]. 2007 14TH INTERNATIONAL WORKSHOP ON SYSTEMS, SIGNALS, & IMAGE PROCESSING & EURASIP CONFERENCE FOCUSED ON SPEECH & IMAGE PROCESSING, MULTIMEDIA COMMUNICATIONS & SERVICES, 2007, : 487 - 498
- [3] A New Cryptographic Scheme for Securing Dynamic Conferences in Data Networks [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-12, 2006, : 2310 - 2315
- [4] One-Way Cryptographic Hash Function Securing Networks [J]. PROCEEDINGS OF ACADEMIA-INDUSTRY CONSORTIUM FOR DATA SCIENCE (AICDS 2020), 2022, 1411 : 105 - 113
- [5] Securing wireless sensor networks with novel hybrid lightweight cryptographic protocols [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (2B): : 703 - 714
- [6] Securing AI Systems: A Comprehensive Overview of Cryptographic Techniques for Enhanced Confidentiality and Integrity [J]. 2024 13TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING, MECO 2024, 2024, : 250 - 257
- [7] Cryptographic Techniques for Wireless Sensor Networks: A Survey [J]. 2015 IEEE BOMBAY SECTION SYMPOSIUM (IBSS), 2015,
- [8] Compiling and securing cryptographic protocols [J]. INFORMATION PROCESSING LETTERS, 2010, 110 (03) : 116 - 122
- [9] Securing all-optical networks [J]. ICTON 2003: 5TH INTERNATIONAL CONFERENCE ON TRANSPARENT OPTICAL NETWORKS, VOL 1, PROCEEDINGS, 2003, : 87 - 90
- [10] Techniques for securing networks against criminal attacks [J]. IC'2000: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTERNET COMPUTING, 2000, : 365 - 369