cryptographic key management
Cryptographic Key Management
22
New Cryptographic Key Management for Smart Grid
53
A Draft Framework for Designing Cryptographic Key Management Systems
35
CRYPTOGRAPHIC KEY MANAGEMENT PRINCIPLES APPLIED IN SOUTH AFRICAN INTERNET BANKING
12
On Energy Optimization in Cryptographic Hash Functions and Symmetric Key Protocols
15
Analyzing the speed of combined cryptographic algorithms with secret and public key
7
A Recent Study of Various Symmetric Key Based Cryptographic Methods
7
Comparison of Time Complexity of Symmetric and Asymmetric Key Cryptographic Algorithms
5
A NOVEL ALGORITHM FOR CRYPTOGRAPHIC KEY GENERATION BASED ON SESSION AND STEGNOGRAPHY
6
Design of RSA Digital Signature Scheme Using A Novel Cryptographic Hash Algorithm
5
Deniable Key Exchange for Privacy Preservation in ON-LINE Shopping
5
Network Security Issues and Cryptography
6
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage
5
An Efficient Method for Secure ECG Feature based Cryptographic Key Generation
6
A Steganography LSB technique for hiding Image within Image Using blowfish Encryption Algorithm
6
Cryptographic and Security Testing Laboratory. Deputy Laboratory Director, CST Laboratory Manager
20
Database Security with Access Control and Assured Deletion Using Cryptographic Key
10
Practical Evaluation of a Secure Key-Distribution and Storage Scheme for Wireless Sensor Networks Using TinyOS
12
Cryptographic Key Exchange using Dual Tone Multi Frequency Generator
8
Key Management With Cryptography
6