Crossref Citations
This Book has been
cited by the following publications. This list is generated based on data provided by Crossref.
Elkamchochi, Hassan M.
Elattar, Refaat A.
and
Abd-Elhamied, Amr H.
2007.
A New Symmetric Key Quantum Cryptographic Algorithm.
p.
1.
Biggs, Norman L.
2008.
Codes: An Introduction to Information Communication and Cryptography.
p.
1.
Amigó, José María
2009.
Intelligent Computing Based on Chaos.
Vol. 184,
Issue. ,
p.
291.
Vincent, O. R.
Folorunso, O.
and
Akinde, A. D.
2010.
Improving e-payment security using Elliptic Curve Cryptosystem.
Electronic Commerce Research,
Vol. 10,
Issue. 1,
p.
27.
Ko, Miyong
and
Goeckel, Dennis L.
2010.
Wireless physical-layer security performance of UWB systems.
p.
2143.
Goeckel, Dennis
Vasudevan, Sudarshan
Towsley, Don
Adams, Stephan
Ding, Z.
and
Leung, K.
2011.
Artificial Noise Generation from Cooperative Relays for Everlasting Secrecy in Two-Hop Wireless Networks.
IEEE Journal on Selected Areas in Communications,
Vol. 29,
Issue. 10,
p.
2067.
Atymtayeva, Lyazzat
Akzhalova, Assel
Kozhakhmet, Kanat
and
Naizabayeva, Lyazat
2011.
Development of intelligent systems for information security auditing and management: Review and assumptions analysis.
p.
1.
Dailey, Maria
2013.
Information Security Fundamentals, Second Edition.
p.
21.
Shen, Yulong
Jiang, Xiaohong
Ma, Jianfeng
and
Shi, Weisong
2013.
Information Technology Convergence.
Vol. 253,
Issue. ,
p.
397.
Goeckel, Dennis
Sheikholeslami, Azadeh
and
Capar, Cagatay
2014.
Everlasting secrecy in wireless communications: Challenges and approaches.
p.
1.
Monteiro, Francisco
Wassell, Ian
and
Souto, Nuno
2014.
MIMO Processing for 4G and Beyond.
p.
47.
Hoffstein, Jeffrey
Pipher, Jill
and
Silverman, Joseph H.
2014.
An Introduction to Mathematical Cryptography.
p.
207.
Finston, David R.
and
Morandi, Patrick J.
2014.
Abstract Algebra.
p.
121.
Finston, David R.
and
Morandi, Patrick J.
2014.
Abstract Algebra.
p.
23.
Ten, Vladimir D.
and
Dyussenbina, Aizhan B.
2014.
Polyalphabetic Euclidean ciphers.
p.
1.
Bash, Boulat A.
Gheorghe, Andrei H.
Patel, Monika
Habif, Jonathan L.
Goeckel, Dennis
Towsley, Don
and
Guha, Saikat
2015.
Quantum-secure covert communication on bosonic channels.
Nature Communications,
Vol. 6,
Issue. 1,
Soltani, Ramin
Goeckel, Dennis
Towsley, Don
and
Houmansadr, Amir
2015.
Covert communications on Poisson packet channels.
p.
1046.
Singh, Sonika
and
Padhye, Sahadeo
2016.
Generalisations of NTRU cryptosystem.
Security and Communication Networks,
Vol. 9,
Issue. 18,
p.
6315.
Maldonado, Carlos Eduardo
2016.
Una Nota Sobre Administraciin Y Criptograffa. Un Caso De Complejidad Y Administraciin (A Note on Management and Criptography. A Case for Complexity and Management).
SSRN Electronic Journal,
Pineda Vargas, Monica Patricia
Rodriguez, Rafael Antonio Acosta
and
Salcedo Parra, Octavio Jose
2017.
Algorithm for the Optimization of RSA Based on Parallelization over GPU SSL/TLS Protocol.
p.
294.