Biblio
Export 12 results:
Filters: Keyword is cryptography [Clear All Filters]
Level of maturity of the Cybersecurity of the infrastructure in the domain iict.bas.bg In IT4Sec Reports., 2022.
Future Development of Quantum Computing and Its Relevance to NATO." Connections: The Quarterly Journal 20, no. 2 (2021): 89-109.
"RSA Weaknesses Caused by the Specifics of Random Number Generation." Information & Security: An International Journal 50, no. 2 (2021): 171-179 .
"Neglected Cybersecurity Risks in the Public Internet Hosting Service Providers." Information & Security: An International Journal 47, no. 1 (2020): 62-76.
"Capture the Flag for Cyber-Resilience Exercising through Cryptographic Puzzles and Collaborative Problem-Solving." Information & Security: An International Journal 37 (2017): 95-102.
"Garbled Circuits: Optimizations and Implementations." Information & Security: An International Journal 37 (2017): 11-27.
"Biometric Template Security Using Code Base Cryptosystem." Information & Security: An International Journal 26, no. 2 (2013): 47-57.
"A Copy Attack on Robust Digital Watermarking in Multi Domain for the Stego Images." Information & Security: An International Journal 26, no. 1 (2011): 27-33.
"Cryptanalysis of the Tseng-Jan Anonymous Conference Key Distribution System Without Using A One-Way Hash Function." Information & Security: An International Journal 15, no. 1 (2004): 110-114.
"Secure e-Mail Application Software for Government in Indonesia." Information & Security: An International Journal 15, no. 2 (2004): 135-150.
"Cryptographic Software Solution for Information Protection in a Corporate Intranet." Information & Security: An International Journal 4 (2000): 97-104.
"Information Assurance in C4I Systems." Information & Security: An International Journal 4 (2000): 43-59.
"