Most Cited & Viewed

Most Cited & Viewed Papers

Citations Article
 
Benchmark Analysis of YOLO Performance on Edge Intelligence Devices
by Haogang Feng, Gaoze Mu, Shida Zhong, Peichang Zhang and Tao Yuan
 
Why Is Deep Learning Challenging for Printed Circuit Board (PCB) Component Recognition and How Can We Address It?
by Mukhil Azhagan Mallaiyan Sathiaseelan, Olivia P. Paradis, Shayan Taheri and Navid Asadizanjani
 
Designing a Practical Code-Based Signature Scheme from Zero-Knowledge Proofs with Trusted Setup
by Shay Gueron, Edoardo Persichetti and Paolo Santini
 
Variations of QKD Protocols Based on Conventional System Measurements: A Literature Review
by Abdulbast A. Abushgra
 
A Novel Ultra-Compact FPGA PUF: The DD-PUF
by Riccardo Della Sala, Davide Bellizia and Giuseppe Scotti
 
A Searchable Encryption Scheme with Biometric Authentication and Authorization for Cloud Environments
by Marius Iulian Mihailescu and Stefania Loredana Nita
 
A Survey on Group Signatures and Ring Signatures: Traceability vs. Anonymity
by Maharage Nisansala Sevwandi Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama, Chen-Mou Cheng and Kouichi Sakurai
 
Light Weight Authentication Scheme for Smart Home IoT Devices
by Vipin Kumar, Navneet Malik, Jimmy Singla, N. Z. Jhanjhi, Fathi Amsaad and Abdul Razaque
 
A Review of Blockchain in Fintech: Taxonomy, Challenges, and Future Directions
by Keerthi Nelaturu, Han Du and Duc-Phong Le
 
ChaCha20–Poly1305 Authenticated Encryption with Additional Data for Transport Layer Security 1.3
by Ronaldo Serrano, Ckristian Duran, Marco Sarmiento, Cong-Kha Pham and Trong-Thuc Hoang
Views Article
A Review of Blockchain in Fintech: Taxonomy, Challenges, and Future Directions
by Keerthi Nelaturu, Han Du and Duc-Phong Le
Why Is Deep Learning Challenging for Printed Circuit Board (PCB) Component Recognition and How Can We Address It?
by Mukhil Azhagan Mallaiyan Sathiaseelan, Olivia P. Paradis, Shayan Taheri and Navid Asadizanjani
Attacking Windows Hello for Business: Is It What We Were Promised?
by Joseph Haddad, Nikolaos Pitropakis, Christos Chrysoulas, Mouad Lemoudden and William J. Buchanan
Benchmark Analysis of YOLO Performance on Edge Intelligence Devices
by Haogang Feng, Gaoze Mu, Shida Zhong, Peichang Zhang and Tao Yuan
Post Quantum Design in SPDM for Device Authentication and Key Establishment
by Jiewen Yao, Krystian Matusiewicz and Vincent Zimmer
On General Data Protection Regulation Vulnerabilities and Privacy Issues, for Wearable Devices and Fitness Tracking Applications
by Irene Ioannidou and Nicolas Sklavos
Post-Quantum and Code-Based Cryptography—Some Prospective Research Directions
by Chithralekha Balamurugan, Kalpana Singh, Ganeshvani Ganesan and Muttukrishnan Rajarajan
Cryptography as the Means to Protect Fundamental Human Rights
by Konstantinos Limniotis
ChaCha20–Poly1305 Authenticated Encryption with Additional Data for Transport Layer Security 1.3
by Ronaldo Serrano, Ckristian Duran, Marco Sarmiento, Cong-Kha Pham and Trong-Thuc Hoang
A Survey of Post-Quantum Cryptography: Start of a New Race
by Duc-Thuan Dam, Thai-Ha Tran, Van-Phuc Hoang, Cong-Kha Pham and Trong-Thuc Hoang
Downloads Article
A Review of Blockchain in Fintech: Taxonomy, Challenges, and Future Directions
by Keerthi Nelaturu, Han Du and Duc-Phong Le
Benchmark Analysis of YOLO Performance on Edge Intelligence Devices
by Haogang Feng, Gaoze Mu, Shida Zhong, Peichang Zhang and Tao Yuan
Why Is Deep Learning Challenging for Printed Circuit Board (PCB) Component Recognition and How Can We Address It?
by Mukhil Azhagan Mallaiyan Sathiaseelan, Olivia P. Paradis, Shayan Taheri and Navid Asadizanjani
A Survey on Group Signatures and Ring Signatures: Traceability vs. Anonymity
by Maharage Nisansala Sevwandi Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama, Chen-Mou Cheng and Kouichi Sakurai
Post-Quantum and Code-Based Cryptography—Some Prospective Research Directions
by Chithralekha Balamurugan, Kalpana Singh, Ganeshvani Ganesan and Muttukrishnan Rajarajan
On General Data Protection Regulation Vulnerabilities and Privacy Issues, for Wearable Devices and Fitness Tracking Applications
by Irene Ioannidou and Nicolas Sklavos
Investigating Deep Learning Approaches on the Security Analysis of Cryptographic Algorithms
by Bang Yuan Chong and Iftekhar Salam
ChaCha20–Poly1305 Authenticated Encryption with Additional Data for Transport Layer Security 1.3
by Ronaldo Serrano, Ckristian Duran, Marco Sarmiento, Cong-Kha Pham and Trong-Thuc Hoang
Post Quantum Design in SPDM for Device Authentication and Key Establishment
by Jiewen Yao, Krystian Matusiewicz and Vincent Zimmer
Light Weight Authentication Scheme for Smart Home IoT Devices
by Vipin Kumar, Navneet Malik, Jimmy Singla, N. Z. Jhanjhi, Fathi Amsaad and Abdul Razaque
Back to TopTop