Secure Computing

1 Open Access Books

21 Authors and Editors

4 Web of Science Citations

7 Dimensions Citations

1 peer-reviewed open access book

Select

Most cited chapters in this category

Chapter titleDownloads
1. Construction of Orthogonal Arrays of Index Unity Using Logarithm Tables for Galois Fields

By Jose Torres-Jimenez, Himer Avila-George, Nelson Rangel-Valdez and Loreto Gonzalez-Hernandez

Part of book: Cryptography and Security in Computing

2962
2. Elliptic Curve Cryptography and Point Counting Algorithms

By Hailiza Kamarulhaili and Liew Khang Jie

Part of book: Cryptography and Security in Computing

4300
3. Comparative Analysis of Master-Key and Interpretative Key Management (IKM) Frameworks

By Saman Shojae Chaeikar, Azizah Bt Abdul Manaf and Mazdak Zamani

Part of book: Cryptography and Security in Computing

1737

Most downloaded chapters in this category in last 30 days

Chapter title
1. Construction of Orthogonal Arrays of Index Unity Using Logarithm Tables for Galois Fields

By Jose Torres-Jimenez, Himer Avila-George, Nelson Rangel-Valdez and Loreto Gonzalez-Hernandez

Part of book: Cryptography and Security in Computing

2. Scan-Based Side-Channel Attack on the RSA Cryptosystem

By Ryuta Nara, Masao Yanagisawa and Nozomu Togawa

Part of book: Cryptography and Security in Computing

3. Elliptic Curve Cryptography and Point Counting Algorithms

By Hailiza Kamarulhaili and Liew Khang Jie

Part of book: Cryptography and Security in Computing

4. Secure and Privacy-Preserving Data Aggregation Protocols for Wireless Sensor Networks

By Jaydip Sen

Part of book: Cryptography and Security in Computing

5. Potential Applications of IPsec in Next Generation Networks

By Cristina-Elena Vintilă

Part of book: Cryptography and Security in Computing

6. Comparative Analysis of Master-Key and Interpretative Key Management (IKM) Frameworks

By Saman Shojae Chaeikar, Azizah Bt Abdul Manaf and Mazdak Zamani

Part of book: Cryptography and Security in Computing

7. Malicious Cryptology and Mathematics

By Eric Filiol

Part of book: Cryptography and Security in Computing

8. Provably Secure Cryptographic Constructions

By Sergey I. Nikolenko

Part of book: Cryptography and Security in Computing

9. Cryptographic Criteria on Vector Boolean Functions

By José Antonio Álvarez-Cubero and Pedro J. Zufiria

Part of book: Cryptography and Security in Computing

10. PGP Protocol and Its Applications

By Hilal M. Yousif Al-Bayatti, Abdul Monem S. Rahma and Hala Bhjat Abdul Wahab

Part of book: Cryptography and Security in Computing