-
1Academic Journal
المؤلفون: Neri Merhav
المصدر: Entropy, Vol 26, Iss 6, p 503 (2024)
مصطلحات موضوعية: encryption, information security, perfect secrecy, finite-state machines, universal coding, Lempel–Ziv algorithm, Science, Astrophysics, QB460-466, Physics, QC1-999
وصف الملف: electronic resource
-
2Conference
المؤلفون: Göztepe, Caner, Karabulut Kurt, GüneÅŸ, Özbek, Berna
مصطلحات موضوعية: Non-orthogonal multiple access, Perfect secrecy, Physical layer security, Software-defined radio, Carrier frequency offset
Relation: 2023 IEEE International Black Sea Conference on Communications and Networking, BlackSeaCom 2023; Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı; https://doi.org/10.1109/BlackSeaCom58138.2023.10299798; https://hdl.handle.net/11147/14153; 2-s2.0-85179003538; N/A
-
3Academic Journal
المؤلفون: Luis Adrián Lizama-Pérez
المصدر: Cryptography, Vol 7, Iss 4, p 50 (2023)
مصطلحات موضوعية: digital signature, encryption, blockchain, XOR function, hash chain, perfect secrecy, Technology
Relation: https://www.mdpi.com/2410-387X/7/4/50; https://doaj.org/toc/2410-387X; https://doaj.org/article/6b7a6a2ee9fc452197d5bd2379cc8ea9
-
4Academic Journal
المؤلفون: Jin Liang, Hu Xiaoyan, Wu Jiangxing
المصدر: Security and Safety, Vol 2, p 2023004 (2023)
مصطلحات موضوعية: perfect instinct function security, perfect secrecy, dhr, endogenous security, one-time reconstruction, generalized safety and security, perfect security, Electronic computers. Computer science, QA75.5-76.95
Relation: https://sands.edpsciences.org/articles/sands/full_html/2023/01/sands20220016/sands20220016.html; https://doaj.org/toc/2826-1275; https://doaj.org/article/f4a40ad906dc4f148d541ebb85346205
-
5Academic Journal
المؤلفون: Larriba, Antonio M., López Rodríguez, Damián
المساهمون: Universitat Politècnica de València. Escola Tècnica Superior d'Enginyeria Informàtica
مصطلحات موضوعية: Electronic Vote, Blind Signatures, Interpolation, Perfect Secrecy, Post-Quantum Cryptography, LENGUAJES Y SISTEMAS INFORMATICOS
Relation: Informatica; https://doi.org/10.15388/22-INFOR503; urn:issn:0868-4952; http://hdl.handle.net/10251/194682
-
6Academic Journal
المؤلفون: Aleksejus Mihalkovich, Matas Levinskas, Eligijus Sakalauskas
المصدر: Mathematics; Volume 10; Issue 18; Pages: 3363
مصطلحات موضوعية: counter mode, symmetric cryptography, perfect secrecy
وصف الملف: application/pdf
Relation: Mathematics and Computer Science; https://dx.doi.org/10.3390/math10183363
الاتاحة: https://doi.org/10.3390/math10183363
-
7Academic Journal
المصدر: Mathematics; Volume 10; Issue 12; Pages: 2123
مصطلحات موضوعية: chosen plaintext attack, CBC mode, symmetric encryption, matrix power function, perfect secrecy
وصف الملف: application/pdf
Relation: Mathematics and Computer Science; https://dx.doi.org/10.3390/math10122123
الاتاحة: https://doi.org/10.3390/math10122123
-
8Academic Journal
المصدر: Informatica., Vilnius : Vilnius university press, 2022, vol. 33, iss. 4, p. 833-856. ; ISSN 0868-4952 ; eISSN 1822-8844
مصطلحات موضوعية: chaining cipher adaptive plaintext symmetric cryptography, perfect secrecy, non-commuting cryptography, matrix power function
وصف الملف: application/pdf
-
9Academic Journal
المصدر: Mathematics., Basel : MDPI, 2022, vol. 10, iss. 18, art. no. 3363, p. 1-17. ; ISSN 2227-7390
مصطلحات موضوعية: counter mode, symmetric cryptography, perfect secrecy
وصف الملف: application/pdf
-
10Academic Journal
المصدر: Mathematics., Basel : MDPI, 2022, vol. 10, iss. 12, art. no. 2123, p. 1-24. ; ISSN 2227-7390
مصطلحات موضوعية: chosen plaintext attack, CBC mode, symmetric encryption, matrix power function, perfect secrecy
وصف الملف: application/pdf
-
11
-
12Academic Journal
المؤلفون: Levinskas, Matas, Mihalkovich, Aleksejus
المصدر: Mathematical models in engineering, Kaunas : JVE International, 2021, vol. 7, iss. 3, p. 50-53 ; ISSN 2351-5279 ; eISSN 2424-4627
مصطلحات موضوعية: symmetric cipher, perfect secrecy, block cipher, matrix power function, avalanche effect, bit independence criterion
وصف الملف: application/pdf
Relation: http://ktu.oai.elaba.lt/documents/108995617.pdf; http://ktu.lvb.lt/KTU:ELABAPDB108995617&prefLang=en_US
-
13Academic Journal
المؤلفون: Matas Levinskas, Aleksejus Mihalkovich
المصدر: Mathematical Models in Engineering, Vol 7, Iss 3, Pp 50-53 (2021)
مصطلحات موضوعية: symmetric cipher, perfect secrecy, block cipher, matrix power function, avalanche effect, bit independence criterion, Applied mathematics. Quantitative methods, T57-57.97
Relation: https://www.extrica.com/article/22234; https://www.extrica.com/article/22234/pdf; https://doaj.org/toc/2351-5279; https://doaj.org/toc/2424-4627; https://doaj.org/article/457d9ec5ae414eb689811f7e45d74758
-
14Academic Journal
المؤلفون: Takao Murakami, Ryo Fujita, Tetsushi Ohki, Yosuke Kaga, Masakazu Fujio, Kenta Takahashi
المصدر: IEEE Access, Vol 7, Pp 45563-45582 (2019)
مصطلحات موضوعية: Biometrics, cancelable biometrics, GAN, perfect secrecy, permutation-based indexing, Electrical engineering. Electronics. Nuclear engineering, TK1-9971
وصف الملف: electronic resource
-
15Academic Journal
المؤلفون: Chuanjun TIAN
المصدر: Tongxin xuebao, Vol 39, Pp 1-9 (2018)
مصطلحات موضوعية: single key cryptosystem, perfect secrecy, nonlinear basic cryptosystem, one-time pad cryptosystem, orthog-onal Latin square, Telecommunication, TK5101-6720
وصف الملف: electronic resource
Relation: https://doaj.org/toc/1000-436X
-
16
المؤلفون: Bosk, Daniel, Kjellqvist, Martin, Buchegger, Sonja
المصدر: SECURE IT SYSTEMS, NORDSEC 2015 Lecture Notes in Computer Science. :72-87
مصطلحات موضوعية: Deniability, Deniable encryption, Authenticated encryption, Perfect secrecy, Off-the-record, Key-exchange, Near-field communication, Surveillance
وصف الملف: electronic
-
17Academic Journal
المؤلفون: Vicente Jara-Vera, Carmen Sánchez-Ávila
المصدر: Mathematics; Volume 8; Issue 9; Pages: 1536
مصطلحات موضوعية: authentication, biometrics, cancellability, cryptography, perfect secrecy, voice
وصف الملف: application/pdf
Relation: Mathematics and Computer Science; https://dx.doi.org/10.3390/math8091536
الاتاحة: https://doi.org/10.3390/math8091536
-
18Academic Journal
المؤلفون: Mikhail Andreevich Styugin
المصدر: Безопасность информационных технологий, Vol 23, Iss 1, Pp 127-140 (2016)
مصطلحات موضوعية: information security, protection from research, perfect secrecy, pseudo random number, cipher, Information technology, T58.5-58.64, Information theory, Q350-390
وصف الملف: electronic resource
-
19Academic Journal
المؤلفون: Mahmood Khalel Ibrahem
المصدر: Iraqi Journal of Information & Communication Technology, Vol 1, Iss 2 (2018)
مصطلحات موضوعية: Perfect Secrecy, one-time-pad system, Chaotic Cryptography, Information technology, T58.5-58.64
وصف الملف: electronic resource
-
20Academic Journal
المؤلفون: Hamamreh, Jehad M., Arslan, Hüseyin
مصطلحات موضوعية: Cross PHY/MAC Layer Security, Automatic Repeat Request (ARQ), Peak-to-Average Power Ratio (PAPR), Out-off-Band Emission (OOBE), Artificial Noise (AN), Maximum Ratio Combining (MRC), Quality of Service (QoS), Throughput, Secure Throughput, Delay, Perfect Secrecy, Packet Error Rate (PER)
وصف الملف: application/pdf
Relation: IEEE Transactions on Wireless Communications; info:eu-repo/grantAgreement/TUBITAK/SOBAG/114E244; Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı; Hamamreh, J. ve Arslan, H. (2018). Joint phy/mac layer security design using arq with mrc and null-space independent papr-aware artificial noise in siso systems. IEEE Transactions on Wireless Communications, 17(9), 6190-6204. https://dx.doi.org/10.1109/TWC.2018.2855163; https://dx.doi.org/10.1109/TWC.2018.2855163; https://hdl.handle.net/20.500.12511/1928; 17; 6190; 6204; Q1