Cryptography, Public and Private Key
Public/Private Key Cryptography PGP Diffie-Hellman key agreement algorithm Symmetric Key (a.k.a. Secret Key) Cryptography SecureICA Services Kerberos UNIX, Windows 2000
18
Exponentiated Multiple Message Communication using Certificateless Signcryption for Mobile Network Security
12
A REVIEW ON A NETWORK SECURITY WITH CRYPTOGRAPHY
9
An investigation on Integer Factorization applied to Public Key Cryptography
157
Public Key Cryptology – An Art of Keeping Secrecy and Authenticity
6
Public-Key Cryptography Techniques Evaluation
12
Data Security and Authentication using Steganography and STS protocol
7
An Enhance Energy Efficient Security in WSN by using Elliptic Curve Session Keys Algorithm
8
Repeated Random Enciphering – A Novel Method to Support Data Security on Transit over Networks
10
A Review on Public Key Cryptography: Algorithms
7
Public Key Infrastructure (PKI) using Symmetric Key Cryptography (SC) in VANETs
6
A SAT-based Public Key Cryptography Scheme
11
SPEED AND SECURITY ENHANCEMENT THROUGH PUBLIC KEY CRYPTOGRAPHY
6
Designing To Provide Reliability in Wireless Sensor Networks Using Cryptographic Techniques
6
Key Management With Cryptography
6
RSA Public Key Cryptography Algorithm A Review
5
Cryptography: A Comparison of Public Key Systems
12
The performance analysis of public key cryptography-based authentication
15
From Laconic Zero-Knowledge to Public-Key Cryptography
25
The private finance initiative (PFI) and finance capital: A note on gaps in the "accountability" debate
51