Most Cited & Viewed

Most Cited & Viewed Papers

Citations Article
 
A Taxonomy of Blockchain Consensus Methods
 
Benchmark Analysis of YOLO Performance on Edge Intelligence Devices
 
Why Is Deep Learning Challenging for Printed Circuit Board (PCB) Component Recognition and How Can We Address It?
 
Designing a Practical Code-Based Signature Scheme from Zero-Knowledge Proofs with Trusted Setup
 
A Novel Ultra-Compact FPGA PUF: The DD-PUF
 
Electromagnetic and Power Side-Channel Analysis: Advanced Attacks and Low-Overhead Generic Countermeasures through White-Box Approach
 
A Survey on Group Signatures and Ring Signatures: Traceability vs. Anonymity
 
A Review of Blockchain in Fintech: Taxonomy, Challenges, and Future Directions
 
Variations of QKD Protocols Based on Conventional System Measurements: A Literature Review
 
A Searchable Encryption Scheme with Biometric Authentication and Authorization for Cloud Environments
Views Article
A Review of Blockchain in Fintech: Taxonomy, Challenges, and Future Directions
Why Is Deep Learning Challenging for Printed Circuit Board (PCB) Component Recognition and How Can We Address It?
A Taxonomy of Blockchain Consensus Methods
Benchmark Analysis of YOLO Performance on Edge Intelligence Devices
Information-Theoretically Secure Data Origin Authentication with Quantum and Classical Resources
On General Data Protection Regulation Vulnerabilities and Privacy Issues, for Wearable Devices and Fitness Tracking Applications
E-ART: A New Encryption Algorithm Based on the Reflection of Binary Search Tree
Cryptography as the Means to Protect Fundamental Human Rights
Attacking Windows Hello for Business: Is It What We Were Promised?
Electromagnetic and Power Side-Channel Analysis: Advanced Attacks and Low-Overhead Generic Countermeasures through White-Box Approach
Downloads Article
A Review of Blockchain in Fintech: Taxonomy, Challenges, and Future Directions
Benchmark Analysis of YOLO Performance on Edge Intelligence Devices
A Taxonomy of Blockchain Consensus Methods
Why Is Deep Learning Challenging for Printed Circuit Board (PCB) Component Recognition and How Can We Address It?
Electromagnetic and Power Side-Channel Analysis: Advanced Attacks and Low-Overhead Generic Countermeasures through White-Box Approach
A Survey on Group Signatures and Ring Signatures: Traceability vs. Anonymity
Post-Quantum and Code-Based Cryptography—Some Prospective Research Directions
Secure Boot for Reconfigurable Architectures
Flash-Based Security Primitives: Evolution, Challenges and Future Directions
Practical and Provably Secure Distributed Aggregation: Verifiable Additive Homomorphic Secret Sharing
Back to TopTop