Search alternatives:
"topographic" » "topography" (Expand Search), "holographic" (Expand Search), "ethnographic" (Expand Search)
"typographic" » "typography" (Expand Search), "cryptographic" (Expand Search), "topographical" (Expand Search)
"tomographic" » "demographic" (Expand Search), "tomography" (Expand Search), "holographic" (Expand Search)
"topographic" » "topography" (Expand Search), "holographic" (Expand Search), "ethnographic" (Expand Search)
"typographic" » "typography" (Expand Search), "cryptographic" (Expand Search), "topographical" (Expand Search)
"tomographic" » "demographic" (Expand Search), "tomography" (Expand Search), "holographic" (Expand Search)
-
1
-
2
Tomographic completeness and robustness of quantum reservoir networks
Published 2023“…We develop a method to assess a tomographic completeness criterion for arbitrary quantum reservoir architectures. …”
Get full text
Journal Article -
3
Mapping nanoscale topographic features in thick tissues with speckle diffraction tomography
Published 2024“…Most importantly, we performed volumetric imaging of cornea inside an ex vivo rat eye and quantified its optical properties, including the mapping of nanoscale topographic features of Dua’s and Descemet’s membranes that had not been previously visualized.…”
Get full text
Article -
4
Black-box cryptography is dangerous III
Published 2013Subjects: “…DRNTU::Library and information science::Cryptography…”
Get full text
Final Year Project (FYP) -
5
Application of elliptic curve cryptography in web security
Published 2009Get full text
Final Year Project (FYP) -
6
Protecting FPGA design with elliptic curve cryptography
Published 2014“…This problem can be solved by encrypting the bitstream using Elliptic Curve Cryptography (ECC). In this project, an efficient ECC-based cryptosystem on FPGA is designed and implemented. …”
Get full text
Final Year Project (FYP) -
7
-
8
Impact of hypertension on retinal capillary microvasculature using optical coherence tomographic angiography
Published 2020“…We measured the retinal capillary density using noninvasive optical coherence tomographic angiography (OCT-A) in adults with treated systemic hypertension and determined possible correlations with ambulatory blood pressure (BP) and renal parameters. …”
Get full text
Journal Article -
9
Post-quantum attacks against symmetric-key cryptography systems
Published 2024“…Contemporary cryptography plays an essential role in the security of digital communication, internet, and data storage. …”
Get full text
Thesis-Doctor of Philosophy -
10
Optical tomographic system based on complementary metal oxide semiconductor area image sensor /
Published 2016software, multimedia -
11
Quantum-Safe Cryptography Algorithms and Approaches : Impacts of Quantum Computing on Cybersecurity /
Published [202Subjects: “…Quantum cryptography…”
Get full text
software, multimedia -
12
-
13
Speeding up secure web transactions using elliptic curve cryptography
Published 2010“…Elliptic Curve Cryptography (ECC) is becoming an attractive alternative to traditional public-key cryptography systems like RSA, Digital Signature Algorithm (DSA) and Diffie-Hellman (DH) as ECC provides similar level of security with smaller key sizes resulting in faster computations, lower power consumption, as well as memory and bandwidth savings. …”
Get full text
Final Year Project (FYP) -
14
Photo-acoustic tomographic image reconstruction from reduced data using physically inspired regularization
Published 2021Get full text
Journal Article -
15
Optical tomographic system based on complementary metal oxide semiconductor area image sensor [electronic resource] /
Published 2016software, multimedia -
16
-
17
-
18
Attacks in Reality: The Limits of Concurrent Error Detection Codes against Laser Fault Injection
Published 2018Subjects: “…Cryptography…”
Get full text
Get full text
Journal Article -
19
The do's and don'ts of quantum memory in cryptanalysis
Published 2023Subjects: “…cryptography…”
Thesis -
20
Mastering Blockchain : Inner workings of blockchain, from cryptography and decentralized identities, to DeFi, NFTs and Web3 /
Published 2023“…Throughout the book, you’ll explore blockchain solutions beyond cryptocurrencies, such as the IoT with blockchain, enterprise blockchains, and tokenization, and gain insight into the future scope of this fascinating and disruptive technology.By the end of this blockchain book, you will have gained a thorough comprehension of the various facets of blockchain and understand the potential of this technology in diverse real-world scenarios.What you will learnGrasp the mechanisms behind Bitcoin, Ethereum, and other cryptocurrenciesUnderstand cryptography and its usage in blockchainBecome familiar with the theoretical foundations of smart contracts and blockchain consensusDevelop DApps using Solidity, Remix, Truffle, and GanacheSolve issues relating to privacy, identity, scalability, and security in enterprise blockchainsDive into the architecture of Ethereum 2.0Delve into emerging trends like DeFi, NFTs, and MetaverseExplore various applications, research topics, and future directions of blockchain Who this book is for. …”
Get full text
Get full text
software, multimedia