共 50 条
- [41] No Random, No Ransom: A Key to Stop Cryptographic Ransomware DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, DIMVA 2018, 2018, 10885 : 234 - 255
- [42] Improvement over Public Key Cryptographic Algorithm 2009 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE, VOLS 1-3, 2009, : 734 - 739
- [43] On the cryptographic key secrecy of the strengthened Yahalom protocol SECURITY AND PRIVACY IN DYNAMIC ENVIRONMENTS, 2006, 201 : 233 - +
- [44] Practical Aspects of Quantum Cryptographic Key Distribution Journal of Cryptology, 2000, 13 : 207 - 220
- [46] Design of a variable key length cryptographic processor Proceedings of the 4th WSEAS International Conference on Applications of Electrical Engineering, 2005, : 231 - 236
- [47] An Approach to Cryptographic Key Exchange Using Fingerprint SECURITY IN COMPUTING AND COMMUNICATIONS, 2014, 467 : 162 - 172
- [48] SIKM - a smart cryptographic key management framework OPEN COMPUTER SCIENCE, 2022, 12 (01): : 17 - 26
- [49] Cryptographic Extraction and Key Derivation: The HKDF Scheme ADVANCES IN CRYPTOLOGY - CRYPTO 2010, 2010, 6223 : 631 - 648
- [50] Evaluating True Cryptographic Key Space Size 2021 IEEE 12TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2021, : 243 - 249