-
1
CRYPTOGRAPHIC KEY IMPROVED PRIVACY UNDER THE CONDITIONS OF SOME OF CRYPTOGRAPHIC KEY VALUE DATA LEAK
Published 2016-07-01“…The article outlines the possibility of increasing the privacy of cryptographic key generated in the conditions of data leakage of some of its values. …”
Get full text
Article -
2
Cryptographic key Generation Using Fingerprint Biometrics
Published 2019-05-01Get full text
Article -
3
Cryptographic key Generation Using Fingerprint Biometrics
Published 2019-05-01Get full text
Article -
4
Cryptographic key Generation Using Fingerprint Biometrics
Published 2019-05-01Get full text
Article -
5
-
6
RSA Cryptographic Key Generation Using Fingerprint Minutiae
Published 2014-12-01“…Human users find difficult to remember long cryptographic keys. Therefore, researchers, for a long time period, have been investigating ways to use biometric features of the user rather than memorable password or passphrase, in an attempt to produce tough and unrepeatable cryptographic keys and to construct the key unpredictable to a hacker who is deficient of important knowledge about the user's biometrics. …”
Get full text
Article -
7
SIKM – a smart cryptographic key management framework
Published 2022-02-01Subjects: “…cryptographic key management…”
Get full text
Article -
8
Cryptographic keys exchange model for smart city applications
Published 2020-11-01Get full text
Article -
9
-
10
Post Quantum Cryptographic Keys Generated with Physical Unclonable Functions
Published 2021-03-01“…In support of public key infrastructures, the distribution, validation and storage of the cryptographic keys is then more complex for handling longer keys. …”
Get full text
Article -
11
The Cryptographic Key Distribution System for IoT Systems in the MQTT Environment
Published 2023-05-01Subjects: Get full text
Article -
12
Personal authentication and cryptographic key generation based on electroencephalographic signals
Published 2023-05-01Subjects: Get full text
Article -
13
Cryptographic Key Management in Delay Tolerant Networks: A Survey
Published 2017-06-01Subjects: “…cryptographic key management…”
Get full text
Article -
14
Generating biometric random cryptographic key based on unique fingerprint features
Published 2023-06-01“…This paper uses the unique biometric features of fingerprints to generate random cryptographic keys. The main aspects of the security of the generated key include the privacy of the fingerprint and the randomness and complexity of the key generation algorithm. …”
Get full text
Article -
15
Generate Cryptographic key using generated 3D- Digital Image
Published 2009-01-01“…Theweakness of the cryptographic key generated from normal color image is clear due to thenearest pixel values of image. …”
Get full text
Article -
16
Retina Based Glowworm Swarm Optimization for Random Cryptographic Key Generation
Published 2022-02-01Subjects: “…Retina, Glowworm Swarm Optimization (GSO), Chaotic map, Random cryptographic key generation…”
Get full text
Article -
17
USING WEBPAGES AS CRYPTOGRAPHIC KEYS IN A ONE-TIME PAD SYSTEM
Published 2023-04-01Subjects: Get full text
Article -
18
ON SOME PROBLEMS OF CRYPTOGRAPHIC KEY DISTRIBUTION USING ARTIFICIAL NEURONAL NETWORKS
Published 2014-05-01Get full text
Article -
19
Best Fit DNA-Based Cryptographic Keys: The Genetic Algorithm Approach
Published 2022-09-01“…Such schemes are crucially dependent on corresponding DNA-based cryptographic keys. However, owing to the redundancy or observable patterns, some of the keys are rendered weak as they are prone to intrusions. …”
Get full text
Article -
20
METHOD OF GENERATING COMMON CRYPTOGRAPHIC KEYS FOR LOOSLY COINCIDENT BINARY SEQUENCES
Published 2016-09-01Get full text
Article