A method for obtaining digital signatures and public-key cryptosystems
about
Quantum information and relativity theoryQuantum algorithms for algebraic problemsDemonstration of a Fundamental Quantum Logic GateZero-Knowledge Proofs of IdentitySecure Authentication for Remote Patient Monitoring with Wireless Medical Sensor NetworksA survey of research progress and development tendency of attribute-based encryptionOn Distinguishing Prime Numbers from Composite NumbersEfficient security mechanisms for mHealth applications using wireless body sensor networksHyDEn: a hybrid steganocryptographic approach for data encryption using randomized error-correcting DNA codesPrivacy-Preserving Location-Based Service Scheme for Mobile Sensing Data.Analysis of Security Protocols for Mobile Healthcare.Parallel point-multiplication architecture using combined group operations for high-speed cryptographic applicationsQuickCash: Secure Transfer Payment Systems.Algorithms, complexity, and the sciences.An enhanced biometric-based authentication scheme for telecare medicine information systems using elliptic curve cryptosystemLocation-aware dynamic session-key management for grid-based Wireless Sensor Networks.RUASN: a robust user authentication framework for wireless sensor networksSecure Data Aggregation with Fully Homomorphic Encryption in Large-Scale Wireless Sensor Networks.Security enhanced multi-factor biometric authentication scheme using bio-hash functionOptical memory card applicability for implementing a portable medical record.Network and data security design for telemedicine applications.1-RAAP: An Efficient 1-Round Anonymous Authentication Protocol for Wireless Body Area Networks.Reset tree-based optical fault detection.An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor NetworksAn algorithm for judging and generating multivariate quadratic quasigroups over Galois fieldsEncryption key distribution via chaos synchronization.News Feature: Code wars.Redactable signatures for signed CDA Documents.Broadcast authentication for wireless sensor networks using nested hashing and the Chinese remainder theoremA genome-wide CRISPR screen reconciles the role of N-linked glycosylation in galectin-3 transport to the cell surface.General immunity and superadditivity of two-way Gaussian quantum cryptography.A Survey of Authentication Schemes in Telecare Medicine Information Systems.Cloud-based privacy-preserving remote ECG monitoring and surveillance.Authenticated key agreement with rekeying for secured body sensor networksA secure integrated medical information system.An Embedded Sensor Node Microcontroller with Crypto-ProcessorsEfficient and Anonymous Authentication Scheme for Wireless Body Area Networks.Security protection of DICOM medical images using dual-layer reversible watermarking with tamper detection capability.Security of quantum digital signatures for classical messages.Secure Many-to-One Communications in Wireless Sensor Networks.
P2860
Q21563866-4A4378CC-83FD-4783-9086-2FFA119C8FBAQ27350179-DFE2C0D2-DD07-4848-80E1-03DA16416830Q27450518-ECD4E30B-CC69-4A08-8857-E52B212DEB22Q27910307-C0200697-8B4C-40A6-B6FE-AD02FCE59EE0Q28603553-DFCB3E70-3852-4F07-8F28-44060EB1D933Q28655597-74F462B6-8929-4768-ADE9-9A1CA159CCC7Q29543607-44530857-414b-ebf5-8bcc-5321d5639a4dQ30462108-B91A9487-E1CA-4F6D-8B8F-FB108EB944F2Q30663782-100FC63A-1D02-4ABE-B60F-6F9030A9461DQ31145363-D52ABF04-0C1B-46F8-B907-60CCD3D0D8B4Q33450767-8852B2DF-239A-44DE-84E4-AA80087ABA48Q33620773-10D13A15-2A7A-4130-861D-860B22C476C8Q33858042-D70EDB04-B523-499B-8EB9-5D4A28EF8B76Q34526653-FA04A819-2825-441C-A15A-A2E5ECD79D51Q35083636-17846B81-63E4-46A8-9DA2-CBD2A43684D7Q35593942-F8B67E60-7FDC-49B0-B9DA-4E3ACAA0A440Q35594376-59153E0D-9FB3-4790-93D2-F2784AE10717Q35685072-E73A11AA-11E3-4F39-AD61-EE201A6ED0DEQ36359750-BEF2272E-BEB4-434F-91C3-76D70118ADFDQ36760735-8408EB76-E43C-4EE8-9EA5-182C1AD2E707Q36883624-7B2A3D1C-6405-40CE-8FD4-20AA937BABCCQ36943375-C5C89C8E-F892-47DD-9D88-5245BE8D9284Q36948046-14F8A892-2622-4AFA-BD2F-80A783F41E71Q37244985-57699180-D945-4439-BF13-2D6D3A8481C9Q37359156-70D942D8-6A71-4BDA-BE98-7861226B49B2Q37663076-B698D809-720D-41B3-823C-ABEFB538E8F5Q37711592-01FAD589-88FC-4D80-A635-7DAAED8F7EA6Q38429309-C54E9EE2-2B11-4025-B358-E5F440C7C353Q38433015-2BF14A7E-13B4-420B-94BC-D6BA8B1911E7Q38642366-8E7B1BBF-819D-40A4-BB92-FD31A7460E54Q38687501-690F2B74-1385-4A3F-95AA-DDD2A811C7F8Q38789132-9A20255E-8249-47EC-B56E-0FCCA8D51809Q39076118-DCB25A38-1863-42BA-AFE3-606E867BBB1AQ39624520-15A61C90-853E-4AC2-A2C4-3F6E3FE5A060Q39690847-F0385E38-5803-464F-A247-A0D93A8CD011Q39809874-24F3C480-214E-4261-8B43-8B04A66E5CB4Q39840993-2215A481-8D8A-4A38-8CE2-546F0B4976B2Q39929979-27086C2D-1539-4A94-AEAB-62F7D9B2D762Q40264498-38B97DEF-C25E-4E22-95C0-C140800C74D1Q40908420-625CAE2F-6A46-41CC-B0DE-5259A87F609B
P2860
A method for obtaining digital signatures and public-key cryptosystems
description
article
@en
artikull shkencor
@sq
artículu científicu
@ast
vědecký článek
@cs
wetenschappelijk artikel
@nl
wissenschaftlicher Artikel
@de
գիտական հոդված
@hy
գիտական յօդուած
@hyw
ലേഖനം
@ml
name
A method for obtaining digital signatures and public-key cryptosystems
@ast
A method for obtaining digital signatures and public-key cryptosystems
@en
A method for obtaining digital signatures and public-key cryptosystems
@nl
type
label
A method for obtaining digital signatures and public-key cryptosystems
@ast
A method for obtaining digital signatures and public-key cryptosystems
@en
A method for obtaining digital signatures and public-key cryptosystems
@nl
prefLabel
A method for obtaining digital signatures and public-key cryptosystems
@ast
A method for obtaining digital signatures and public-key cryptosystems
@en
A method for obtaining digital signatures and public-key cryptosystems
@nl
P50
P3181
P356
P1476
A method for obtaining digital signatures and public-key cryptosystems
@en
P3181
P356
10.1145/359340.359342