Filtros : "CRIPTOLOGIA" Removido: "Brasil" Limpar

Filtros



Refine with date range


  • Source: Computers. Unidade: EESC

    Subjects: CRIPTOLOGIA, ENGENHARIA ELÉTRICA

    Versão PublicadaAcesso à fonteDOIHow to cite
    A citação é gerada automaticamente e pode não estar totalmente de acordo com as normas
    • ABNT

      FRANCK, Lucas Daudt et al. Custom ASIC design for SHA-256 using open-source tools. Computers, v. 13, n. 9, p. 1-16, 2024Tradução . . Disponível em: https://dx.doi.org/10.3390/computers13010009. Acesso em: 06 nov. 2024.
    • APA

      Franck, L. D., Ginja, ^G. ^A., Carmo, J. P. P. do, Afonso, J. A., & Luppe, M. (2024). Custom ASIC design for SHA-256 using open-source tools. Computers, 13( 9), 1-16. doi:10.3390/computers13010009
    • NLM

      Franck LD, Ginja ^G^A, Carmo JPP do, Afonso JA, Luppe M. Custom ASIC design for SHA-256 using open-source tools [Internet]. Computers. 2024 ; 13( 9): 1-16.[citado 2024 nov. 06 ] Available from: https://dx.doi.org/10.3390/computers13010009
    • Vancouver

      Franck LD, Ginja ^G^A, Carmo JPP do, Afonso JA, Luppe M. Custom ASIC design for SHA-256 using open-source tools [Internet]. Computers. 2024 ; 13( 9): 1-16.[citado 2024 nov. 06 ] Available from: https://dx.doi.org/10.3390/computers13010009
  • Source: IEEE Transactions on Information Forensics and Security. Unidade: EESC

    Subjects: SISTEMA DE COMUNICAÇÃO, PROCESSAMENTO DIGITAL DE SINAIS, CRIPTOLOGIA, ENGENHARIA ELÉTRICA

    PrivadoAcesso à fonteDOIHow to cite
    A citação é gerada automaticamente e pode não estar totalmente de acordo com as normas
    • ABNT

      ABBADE, Marcelo L. F. et al. Discrete spectral encryption of single-carrier signals with pseudo random dynamic keys. IEEE Transactions on Information Forensics and Security, v. 19, p. 4914-4929, 2024Tradução . . Disponível em: http://dx.doi.org/10.1109/TIFS.2024.3390995. Acesso em: 06 nov. 2024.
    • APA

      Abbade, M. L. F., Souza, W. S., Santos, M. O., Rodrigues, I. E. L., Aldaya, I., Bonani, L. H., & Romero, M. A. (2024). Discrete spectral encryption of single-carrier signals with pseudo random dynamic keys. IEEE Transactions on Information Forensics and Security, 19, 4914-4929. doi:10.1109/TIFS.2024.3390995
    • NLM

      Abbade MLF, Souza WS, Santos MO, Rodrigues IEL, Aldaya I, Bonani LH, Romero MA. Discrete spectral encryption of single-carrier signals with pseudo random dynamic keys [Internet]. IEEE Transactions on Information Forensics and Security. 2024 ; 19 4914-4929.[citado 2024 nov. 06 ] Available from: http://dx.doi.org/10.1109/TIFS.2024.3390995
    • Vancouver

      Abbade MLF, Souza WS, Santos MO, Rodrigues IEL, Aldaya I, Bonani LH, Romero MA. Discrete spectral encryption of single-carrier signals with pseudo random dynamic keys [Internet]. IEEE Transactions on Information Forensics and Security. 2024 ; 19 4914-4929.[citado 2024 nov. 06 ] Available from: http://dx.doi.org/10.1109/TIFS.2024.3390995
  • Source: Journal of Information Security and Applications. Unidades: ICMC, EESC

    Subjects: BANCO DE DADOS, VOTAÇÃO, CRIPTOLOGIA, PRIVACIDADE

    PrivadoAcesso à fonteDOIHow to cite
    A citação é gerada automaticamente e pode não estar totalmente de acordo com as normas
    • ABNT

      MIRANDA, Livia Maria Bettini de et al. Blockchain in inter-organizational collaboration: a privacy-preserving voting system for collective decision-making. Journal of Information Security and Applications, v. 85, p. 1-13, 2024Tradução . . Disponível em: https://doi.org/10.1016/j.jisa.2024.103837. Acesso em: 06 nov. 2024.
    • APA

      Miranda, L. M. B. de, Garcia, R. D., Ramachandran, G. S., Ueyama, J., & Guerrini, F. M. (2024). Blockchain in inter-organizational collaboration: a privacy-preserving voting system for collective decision-making. Journal of Information Security and Applications, 85, 1-13. doi:10.1016/j.jisa.2024.103837
    • NLM

      Miranda LMB de, Garcia RD, Ramachandran GS, Ueyama J, Guerrini FM. Blockchain in inter-organizational collaboration: a privacy-preserving voting system for collective decision-making [Internet]. Journal of Information Security and Applications. 2024 ; 85 1-13.[citado 2024 nov. 06 ] Available from: https://doi.org/10.1016/j.jisa.2024.103837
    • Vancouver

      Miranda LMB de, Garcia RD, Ramachandran GS, Ueyama J, Guerrini FM. Blockchain in inter-organizational collaboration: a privacy-preserving voting system for collective decision-making [Internet]. Journal of Information Security and Applications. 2024 ; 85 1-13.[citado 2024 nov. 06 ] Available from: https://doi.org/10.1016/j.jisa.2024.103837
  • Source: Journal of Information Security and Applications. Unidades: EESC, ICMC

    Subjects: CRIPTOLOGIA, TOMADA DE DECISÃO, VOTO ELETRÔNICO, PRIVACIDADE, ENGENHARIA DE PRODUÇÃO

    PrivadoAcesso à fonteDOIHow to cite
    A citação é gerada automaticamente e pode não estar totalmente de acordo com as normas
    • ABNT

      MIRANDA, Livia Maria Bettini de et al. Blockchain in inter-organizational collaboration: a privacy-preserving voting system for collective decision-making. Journal of Information Security and Applications, v. 85, p. 1-13, 2024Tradução . . Disponível em: https://dx.doi.org/10.1016/j.jisa.2024.103837. Acesso em: 06 nov. 2024.
    • APA

      Miranda, L. M. B. de, Garcia, R. D., Ramachandran, G. S., Ueyama, J., & Guerrini, F. M. (2024). Blockchain in inter-organizational collaboration: a privacy-preserving voting system for collective decision-making. Journal of Information Security and Applications, 85, 1-13. doi:10.1016/j.jisa.2024.103837
    • NLM

      Miranda LMB de, Garcia RD, Ramachandran GS, Ueyama J, Guerrini FM. Blockchain in inter-organizational collaboration: a privacy-preserving voting system for collective decision-making [Internet]. Journal of Information Security and Applications. 2024 ; 85 1-13.[citado 2024 nov. 06 ] Available from: https://dx.doi.org/10.1016/j.jisa.2024.103837
    • Vancouver

      Miranda LMB de, Garcia RD, Ramachandran GS, Ueyama J, Guerrini FM. Blockchain in inter-organizational collaboration: a privacy-preserving voting system for collective decision-making [Internet]. Journal of Information Security and Applications. 2024 ; 85 1-13.[citado 2024 nov. 06 ] Available from: https://dx.doi.org/10.1016/j.jisa.2024.103837
  • Source: IEEE Access. Unidade: IME

    Subjects: COMPUTAÇÃO EM NUVEM, SEGURANÇA DE REDES, CRIPTOLOGIA, APROXIMAÇÃO POR POLINÔMIOS

    Versão PublicadaAcesso à fonteDOIHow to cite
    A citação é gerada automaticamente e pode não estar totalmente de acordo com as normas
    • ABNT

      PULIDO-GAYTAN, Bernardo et al. Toward understanding efficient privacy-preserving homomorphic comparison. IEEE Access, v. 11, p. 102189-102206, 2023Tradução . . Disponível em: https://doi.org/10.1109/ACCESS.2023.3315655. Acesso em: 06 nov. 2024.
    • APA

      Pulido-Gaytan, B., Tchernykh, A., Leprévost, F., Bouvry, P., & Goldman, A. (2023). Toward understanding efficient privacy-preserving homomorphic comparison. IEEE Access, 11, 102189-102206. doi:10.1109/ACCESS.2023.3315655
    • NLM

      Pulido-Gaytan B, Tchernykh A, Leprévost F, Bouvry P, Goldman A. Toward understanding efficient privacy-preserving homomorphic comparison [Internet]. IEEE Access. 2023 ; 11 102189-102206.[citado 2024 nov. 06 ] Available from: https://doi.org/10.1109/ACCESS.2023.3315655
    • Vancouver

      Pulido-Gaytan B, Tchernykh A, Leprévost F, Bouvry P, Goldman A. Toward understanding efficient privacy-preserving homomorphic comparison [Internet]. IEEE Access. 2023 ; 11 102189-102206.[citado 2024 nov. 06 ] Available from: https://doi.org/10.1109/ACCESS.2023.3315655
  • Source: International journal for innovation education and research. Unidade: EEL

    Assunto: CRIPTOLOGIA

    Acesso à fonteDOIHow to cite
    A citação é gerada automaticamente e pode não estar totalmente de acordo com as normas
    • ABNT

      VIDAL, Savia Cristina e CAPRI, Maria da Rosa e ROMAO, Estaner Claro. Cryptography as an educational tool in counting techniques for high school. International journal for innovation education and research, v. 10, n. 5, p. 76-88, 2022Tradução . . Disponível em: https://doi.org/10.31686/ijier.vol10.iss5.3743. Acesso em: 06 nov. 2024.
    • APA

      Vidal, S. C., Capri, M. da R., & Romao, E. C. (2022). Cryptography as an educational tool in counting techniques for high school. International journal for innovation education and research, 10( 5), 76-88. doi:10.31686/ijier.vol10.iss5.3743
    • NLM

      Vidal SC, Capri M da R, Romao EC. Cryptography as an educational tool in counting techniques for high school [Internet]. International journal for innovation education and research. 2022 ;10( 5): 76-88.[citado 2024 nov. 06 ] Available from: https://doi.org/10.31686/ijier.vol10.iss5.3743
    • Vancouver

      Vidal SC, Capri M da R, Romao EC. Cryptography as an educational tool in counting techniques for high school [Internet]. International journal for innovation education and research. 2022 ;10( 5): 76-88.[citado 2024 nov. 06 ] Available from: https://doi.org/10.31686/ijier.vol10.iss5.3743
  • Source: IEEE Transactions on Network and Service Management. Unidade: ICMC

    Subjects: SEGURANÇA DE REDES, CRIPTOLOGIA, PRIVACIDADE, REGISTROS MÉDICOS

    PrivadoAcesso à fonteDOIHow to cite
    A citação é gerada automaticamente e pode não estar totalmente de acordo com as normas
    • ABNT

      GARCIA, Rodrigo Dutra et al. Blockchain-aided and privacy-preserving data governance in multi-stakeholder applications. IEEE Transactions on Network and Service Management, v. 19, n. 4, p. 3781-3793, 2022Tradução . . Disponível em: https://doi.org/10.1109/TNSM.2022.3225254. Acesso em: 06 nov. 2024.
    • APA

      Garcia, R. D., Ramachandran, G. S., Jurdak, R., & Ueyama, J. (2022). Blockchain-aided and privacy-preserving data governance in multi-stakeholder applications. IEEE Transactions on Network and Service Management, 19( 4), 3781-3793. doi:10.1109/TNSM.2022.3225254
    • NLM

      Garcia RD, Ramachandran GS, Jurdak R, Ueyama J. Blockchain-aided and privacy-preserving data governance in multi-stakeholder applications [Internet]. IEEE Transactions on Network and Service Management. 2022 ; 19( 4): 3781-3793.[citado 2024 nov. 06 ] Available from: https://doi.org/10.1109/TNSM.2022.3225254
    • Vancouver

      Garcia RD, Ramachandran GS, Jurdak R, Ueyama J. Blockchain-aided and privacy-preserving data governance in multi-stakeholder applications [Internet]. IEEE Transactions on Network and Service Management. 2022 ; 19( 4): 3781-3793.[citado 2024 nov. 06 ] Available from: https://doi.org/10.1109/TNSM.2022.3225254
  • Source: IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. Unidade: IME

    Subjects: INFORMÁTICA, CRIPTOLOGIA, COMPUTAÇÃO QUÂNTICA

    Acesso à fonteDOIHow to cite
    A citação é gerada automaticamente e pode não estar totalmente de acordo com as normas
    • ABNT

      TERADA, Routo e CÁCERES VILLENA, Reynaldo. Vulnerability: information leakage of reused secret key in NewHope. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, v. E105.A, n. 6, p. 952-964, 2022Tradução . . Disponível em: https://doi.org/10.1587/transfun.2021EAP1048. Acesso em: 06 nov. 2024.
    • APA

      Terada, R., & Cáceres Villena, R. (2022). Vulnerability: information leakage of reused secret key in NewHope. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E105.A( 6), 952-964. doi:10.1587/transfun.2021EAP1048
    • NLM

      Terada R, Cáceres Villena R. Vulnerability: information leakage of reused secret key in NewHope [Internet]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. 2022 ; E105.A( 6): 952-964.[citado 2024 nov. 06 ] Available from: https://doi.org/10.1587/transfun.2021EAP1048
    • Vancouver

      Terada R, Cáceres Villena R. Vulnerability: information leakage of reused secret key in NewHope [Internet]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. 2022 ; E105.A( 6): 952-964.[citado 2024 nov. 06 ] Available from: https://doi.org/10.1587/transfun.2021EAP1048
  • Source: IACR Transactions on Cryptographic Hardware and Embedded Systems. Unidade: IME

    Assunto: CRIPTOLOGIA

    PrivadoAcesso à fonteDOIHow to cite
    A citação é gerada automaticamente e pode não estar totalmente de acordo com as normas
    • ABNT

      PAIVA, Thales Bandiera e TERADA, Routo. Faster constant-time decoder for MDPC codes and applications to BIKE KEM. IACR Transactions on Cryptographic Hardware and Embedded Systems, v. 2022, n. 4, p. 110-134, 2022Tradução . . Disponível em: https://doi.org/10.46586/tches.v2022.i4.110-134. Acesso em: 06 nov. 2024.
    • APA

      Paiva, T. B., & Terada, R. (2022). Faster constant-time decoder for MDPC codes and applications to BIKE KEM. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022( 4), 110-134. doi:10.46586/tches.v2022.i4.110-134
    • NLM

      Paiva TB, Terada R. Faster constant-time decoder for MDPC codes and applications to BIKE KEM [Internet]. IACR Transactions on Cryptographic Hardware and Embedded Systems. 2022 ; 2022( 4): 110-134.[citado 2024 nov. 06 ] Available from: https://doi.org/10.46586/tches.v2022.i4.110-134
    • Vancouver

      Paiva TB, Terada R. Faster constant-time decoder for MDPC codes and applications to BIKE KEM [Internet]. IACR Transactions on Cryptographic Hardware and Embedded Systems. 2022 ; 2022( 4): 110-134.[citado 2024 nov. 06 ] Available from: https://doi.org/10.46586/tches.v2022.i4.110-134
  • Source: Connection Science. Unidade: ICMC

    Subjects: COMPUTAÇÃO EM NUVEM, RECUPERAÇÃO DA INFORMAÇÃO, CRIPTOLOGIA

    PrivadoAcesso à fonteDOIHow to cite
    A citação é gerada automaticamente e pode não estar totalmente de acordo com as normas
    • ABNT

      XIAO, Tingting et al. Multi-keyword ranked search based on mapping set matching in cloud ciphertext storage system. Connection Science, v. 33, n. 1, p. 95-112, 2021Tradução . . Disponível em: https://doi.org/10.1080/09540091.2020.1753175. Acesso em: 06 nov. 2024.
    • APA

      Xiao, T., Han, D., He, J., Li, K. -C., & Mello, R. F. de. (2021). Multi-keyword ranked search based on mapping set matching in cloud ciphertext storage system. Connection Science, 33( 1), 95-112. doi:10.1080/09540091.2020.1753175
    • NLM

      Xiao T, Han D, He J, Li K-C, Mello RF de. Multi-keyword ranked search based on mapping set matching in cloud ciphertext storage system [Internet]. Connection Science. 2021 ; 33( 1): 95-112.[citado 2024 nov. 06 ] Available from: https://doi.org/10.1080/09540091.2020.1753175
    • Vancouver

      Xiao T, Han D, He J, Li K-C, Mello RF de. Multi-keyword ranked search based on mapping set matching in cloud ciphertext storage system [Internet]. Connection Science. 2021 ; 33( 1): 95-112.[citado 2024 nov. 06 ] Available from: https://doi.org/10.1080/09540091.2020.1753175
  • Source: Research Anthology on Artificial Intelligence Applications in Security. Unidade: ICMC

    Subjects: BANCO DE DADOS DISTRIBUÍDOS, COMPUTAÇÃO EM NUVEM, SEGURANÇA DE REDES, CRIPTOLOGIA

    PrivadoAcesso à fonteDOIHow to cite
    A citação é gerada automaticamente e pode não estar totalmente de acordo com as normas
    • ABNT

      LOPES, Claudivan Cruz et al. An encryption methodology for enabling the use of data warehouses on the cloud. Research Anthology on Artificial Intelligence Applications in Security. Tradução . Hershey: IGI Global, 2021. . Disponível em: https://doi.org/10.4018/978-1-7998-7705-9.ch026. Acesso em: 06 nov. 2024.
    • APA

      Lopes, C. C., Times, V. C., Matwin, S., Ciferri, C. D. de A., & Ciferri, R. R. (2021). An encryption methodology for enabling the use of data warehouses on the cloud. In Research Anthology on Artificial Intelligence Applications in Security. Hershey: IGI Global. doi:10.4018/978-1-7998-7705-9.ch026
    • NLM

      Lopes CC, Times VC, Matwin S, Ciferri CD de A, Ciferri RR. An encryption methodology for enabling the use of data warehouses on the cloud [Internet]. In: Research Anthology on Artificial Intelligence Applications in Security. Hershey: IGI Global; 2021. [citado 2024 nov. 06 ] Available from: https://doi.org/10.4018/978-1-7998-7705-9.ch026
    • Vancouver

      Lopes CC, Times VC, Matwin S, Ciferri CD de A, Ciferri RR. An encryption methodology for enabling the use of data warehouses on the cloud [Internet]. In: Research Anthology on Artificial Intelligence Applications in Security. Hershey: IGI Global; 2021. [citado 2024 nov. 06 ] Available from: https://doi.org/10.4018/978-1-7998-7705-9.ch026
  • Source: Proceedings. Conference titles: International Conference on Applied Cryptography and Network Security - ACNS. Unidade: IME

    Subjects: CRIPTOLOGIA, SEGURANÇA DE REDES

    Acesso à fonteDOIHow to cite
    A citação é gerada automaticamente e pode não estar totalmente de acordo com as normas
    • ABNT

      PAIVA, Thales Bandiera e TERADA, Routo. Cryptanalysis of the binary permuted kernel problem. 2021, Anais.. Cham: Springer, 2021. Disponível em: https://doi.org/10.1007/978-3-030-78375-4_16. Acesso em: 06 nov. 2024.
    • APA

      Paiva, T. B., & Terada, R. (2021). Cryptanalysis of the binary permuted kernel problem. In Proceedings. Cham: Springer. doi:10.1007/978-3-030-78375-4_16
    • NLM

      Paiva TB, Terada R. Cryptanalysis of the binary permuted kernel problem [Internet]. Proceedings. 2021 ;[citado 2024 nov. 06 ] Available from: https://doi.org/10.1007/978-3-030-78375-4_16
    • Vancouver

      Paiva TB, Terada R. Cryptanalysis of the binary permuted kernel problem [Internet]. Proceedings. 2021 ;[citado 2024 nov. 06 ] Available from: https://doi.org/10.1007/978-3-030-78375-4_16
  • Source: Nonlinear Dynamics. Unidades: IFSC, EP

    Subjects: CRIPTOLOGIA, CAOS (SISTEMAS DINÂMICOS), TEORIA DA INFORMAÇÃO

    Versão PublicadaAcesso à fonteDOIHow to cite
    A citação é gerada automaticamente e pode não estar totalmente de acordo com as normas
    • ABNT

      MACHICAO, Jeaneth e BRUNO, Odemir Martinez e BAPTISTA, Murilo S. Zooming into chaos as a pathway for the creation of a fast, light and reliable cryptosystem. Nonlinear Dynamics, v. 104, n. 1, p. 753-764, 2021Tradução . . Disponível em: https://doi.org/10.1007/s11071-021-06280-y. Acesso em: 06 nov. 2024.
    • APA

      Machicao, J., Bruno, O. M., & Baptista, M. S. (2021). Zooming into chaos as a pathway for the creation of a fast, light and reliable cryptosystem. Nonlinear Dynamics, 104( 1), 753-764. doi:10.1007/s11071-021-06280-y
    • NLM

      Machicao J, Bruno OM, Baptista MS. Zooming into chaos as a pathway for the creation of a fast, light and reliable cryptosystem [Internet]. Nonlinear Dynamics. 2021 ; 104( 1): 753-764.[citado 2024 nov. 06 ] Available from: https://doi.org/10.1007/s11071-021-06280-y
    • Vancouver

      Machicao J, Bruno OM, Baptista MS. Zooming into chaos as a pathway for the creation of a fast, light and reliable cryptosystem [Internet]. Nonlinear Dynamics. 2021 ; 104( 1): 753-764.[citado 2024 nov. 06 ] Available from: https://doi.org/10.1007/s11071-021-06280-y
  • Source: Proceedings. Conference titles: International Conference on Selected Areas in Cryptography - SAC 2019. Unidade: IME

    Assunto: CRIPTOLOGIA

    PrivadoAcesso à fonteDOIHow to cite
    A citação é gerada automaticamente e pode não estar totalmente de acordo com as normas
    • ABNT

      PAIVA, Thales Bandiera e TERADA, Routo. A timing attack on the HQC encryption scheme. 2020, Anais.. Cham: Springer, 2020. Disponível em: https://doi.org/10.1007/978-3-030-38471-5_2. Acesso em: 06 nov. 2024.
    • APA

      Paiva, T. B., & Terada, R. (2020). A timing attack on the HQC encryption scheme. In Proceedings. Cham: Springer. doi:10.1007/978-3-030-38471-5_2
    • NLM

      Paiva TB, Terada R. A timing attack on the HQC encryption scheme [Internet]. Proceedings. 2020 ;[citado 2024 nov. 06 ] Available from: https://doi.org/10.1007/978-3-030-38471-5_2
    • Vancouver

      Paiva TB, Terada R. A timing attack on the HQC encryption scheme [Internet]. Proceedings. 2020 ;[citado 2024 nov. 06 ] Available from: https://doi.org/10.1007/978-3-030-38471-5_2
  • Source: Proceedings. Conference titles: International Joint Conference on Neural Networks - IJCNN. Unidade: FFCLRP

    Subjects: MENSAGEM, CHAT, CRIPTOLOGIA, PRIVACIDADE, FRAMEWORKS

    Acesso à fonteDOIHow to cite
    A citação é gerada automaticamente e pode não estar totalmente de acordo com as normas
    • ABNT

      COTACALLAPA, Moshe et al. Measuring the engagement level in encrypted group conversations by using temporal networks. 2020, Anais.. Los Alamitos: Faculdade de Filosofia, Ciências e Letras de Ribeirão Preto, Universidade de São Paulo, 2020. Disponível em: https://doi.org/10.1109/IJCNN48605.2020.9207174. Acesso em: 06 nov. 2024.
    • APA

      Cotacallapa, M., Berton, L., Ferreira, L. N., Quiles, M. G., Liang, Z., Macau, E. E. N., & Vega-Oliveros, D. A. (2020). Measuring the engagement level in encrypted group conversations by using temporal networks. In Proceedings. Los Alamitos: Faculdade de Filosofia, Ciências e Letras de Ribeirão Preto, Universidade de São Paulo. doi:10.1109/IJCNN48605.2020.9207174
    • NLM

      Cotacallapa M, Berton L, Ferreira LN, Quiles MG, Liang Z, Macau EEN, Vega-Oliveros DA. Measuring the engagement level in encrypted group conversations by using temporal networks [Internet]. Proceedings. 2020 ;[citado 2024 nov. 06 ] Available from: https://doi.org/10.1109/IJCNN48605.2020.9207174
    • Vancouver

      Cotacallapa M, Berton L, Ferreira LN, Quiles MG, Liang Z, Macau EEN, Vega-Oliveros DA. Measuring the engagement level in encrypted group conversations by using temporal networks [Internet]. Proceedings. 2020 ;[citado 2024 nov. 06 ] Available from: https://doi.org/10.1109/IJCNN48605.2020.9207174
  • Source: Proceedings. Conference titles: IEEE Latin American Symposium on Circuits and Systems - LASCAS. Unidade: EESC

    Subjects: CRIPTOLOGIA, CIRCUITOS LÓGICOS, GERAÇÃO DE NÚMEROS ALEATÓRIOS

    PrivadoAcesso à fonteDOIHow to cite
    A citação é gerada automaticamente e pode não estar totalmente de acordo com as normas
    • ABNT

      KOTAKI, Matheus Mitsuo de Almeida e LUPPE, Maximiliam. FPGA implementation of a pseudorandom number generator based on k: logistic map. 2020, Anais.. Piscataway, NJ: Escola de Engenharia de São Carlos, Universidade de São Paulo, 2020. Disponível em: http://dx.doi.org/10.1109/LASCAS45839.2020.9068999. Acesso em: 06 nov. 2024.
    • APA

      Kotaki, M. M. de A., & Luppe, M. (2020). FPGA implementation of a pseudorandom number generator based on k: logistic map. In Proceedings. Piscataway, NJ: Escola de Engenharia de São Carlos, Universidade de São Paulo. doi:10.1109/LASCAS45839.2020.9068999
    • NLM

      Kotaki MM de A, Luppe M. FPGA implementation of a pseudorandom number generator based on k: logistic map [Internet]. Proceedings. 2020 ;[citado 2024 nov. 06 ] Available from: http://dx.doi.org/10.1109/LASCAS45839.2020.9068999
    • Vancouver

      Kotaki MM de A, Luppe M. FPGA implementation of a pseudorandom number generator based on k: logistic map [Internet]. Proceedings. 2020 ;[citado 2024 nov. 06 ] Available from: http://dx.doi.org/10.1109/LASCAS45839.2020.9068999
  • Source: Proceedings. Conference titles: International Conference on Information Security - ISC. Unidade: IME

    Assunto: CRIPTOLOGIA

    PrivadoAcesso à fonteDOIHow to cite
    A citação é gerada automaticamente e pode não estar totalmente de acordo com as normas
    • ABNT

      PAIVA, Thales Bandiera e NAVARIDAS, Javier e TERADA, Routo. Robust covert channels based on DRAM power consumption. 2019, Anais.. Cham: Springer, 2019. Disponível em: https://doi.org/10.1007/978-3-030-30215-3_16. Acesso em: 06 nov. 2024.
    • APA

      Paiva, T. B., Navaridas, J., & Terada, R. (2019). Robust covert channels based on DRAM power consumption. In Proceedings. Cham: Springer. doi:10.1007/978-3-030-30215-3_16
    • NLM

      Paiva TB, Navaridas J, Terada R. Robust covert channels based on DRAM power consumption [Internet]. Proceedings. 2019 ;[citado 2024 nov. 06 ] Available from: https://doi.org/10.1007/978-3-030-30215-3_16
    • Vancouver

      Paiva TB, Navaridas J, Terada R. Robust covert channels based on DRAM power consumption [Internet]. Proceedings. 2019 ;[citado 2024 nov. 06 ] Available from: https://doi.org/10.1007/978-3-030-30215-3_16
  • Source: IEEE Transactions on Industrial Electronics. Unidade: EESC

    Subjects: ARQUITETURA CLIENTE/SERVIDOR, SISTEMAS EMBUTIDOS, ALGORITMOS, CRIPTOLOGIA, ENGENHARIA ELÉTRICA

    Acesso à fonteDOIHow to cite
    A citação é gerada automaticamente e pode não estar totalmente de acordo com as normas
    • ABNT

      CAROPRESO, Rodrigo de Toledo et al. An open-source framework for smart meters: data communication and security traffic analysis. IEEE Transactions on Industrial Electronics, v. 66, n. 2, p. 1638-1647, 2019Tradução . . Disponível em: https://doi.org/10.1109/TIE.2018.2808927. Acesso em: 06 nov. 2024.
    • APA

      Caropreso, R. de T., Fernandes, R. A., Moya Osorio, D. P., & Silva, I. N. da. (2019). An open-source framework for smart meters: data communication and security traffic analysis. IEEE Transactions on Industrial Electronics, 66( 2), 1638-1647. doi:10.1109/TIE.2018.2808927
    • NLM

      Caropreso R de T, Fernandes RA, Moya Osorio DP, Silva IN da. An open-source framework for smart meters: data communication and security traffic analysis [Internet]. IEEE Transactions on Industrial Electronics. 2019 ; 66( 2): 1638-1647.[citado 2024 nov. 06 ] Available from: https://doi.org/10.1109/TIE.2018.2808927
    • Vancouver

      Caropreso R de T, Fernandes RA, Moya Osorio DP, Silva IN da. An open-source framework for smart meters: data communication and security traffic analysis [Internet]. IEEE Transactions on Industrial Electronics. 2019 ; 66( 2): 1638-1647.[citado 2024 nov. 06 ] Available from: https://doi.org/10.1109/TIE.2018.2808927
  • Source: International Journal of Data Warehousing and Mining. Unidade: ICMC

    Subjects: BANCO DE DADOS DISTRIBUÍDOS, COMPUTAÇÃO EM NUVEM, SEGURANÇA DE REDES, CRIPTOLOGIA, BENCHMARKS

    Acesso à fonteDOIHow to cite
    A citação é gerada automaticamente e pode não estar totalmente de acordo com as normas
    • ABNT

      LOPES, Claudivan Cruz et al. An encryption methodology for enabling the use of data warehouses on the cloud. International Journal of Data Warehousing and Mining, v. 14, n. 4, p. 38-66, 2018Tradução . . Disponível em: https://doi.org/10.4018/IJDWM.2018100103. Acesso em: 06 nov. 2024.
    • APA

      Lopes, C. C., Times, V. C., Matwin, S., Ciferri, C. D. de A., & Ciferri, R. R. (2018). An encryption methodology for enabling the use of data warehouses on the cloud. International Journal of Data Warehousing and Mining, 14( 4), 38-66. doi:10.4018/IJDWM.2018100103
    • NLM

      Lopes CC, Times VC, Matwin S, Ciferri CD de A, Ciferri RR. An encryption methodology for enabling the use of data warehouses on the cloud [Internet]. International Journal of Data Warehousing and Mining. 2018 ; 14( 4): 38-66.[citado 2024 nov. 06 ] Available from: https://doi.org/10.4018/IJDWM.2018100103
    • Vancouver

      Lopes CC, Times VC, Matwin S, Ciferri CD de A, Ciferri RR. An encryption methodology for enabling the use of data warehouses on the cloud [Internet]. International Journal of Data Warehousing and Mining. 2018 ; 14( 4): 38-66.[citado 2024 nov. 06 ] Available from: https://doi.org/10.4018/IJDWM.2018100103
  • Source: Proceedings. Conference titles: International Conference on Unmanned Aircraft Systems - ICUAS. Unidade: ICMC

    Subjects: AERONAVES NÃO TRIPULADAS, COMPUTAÇÃO EM NUVEM, ARQUITETURA E ORGANIZAÇÃO DE COMPUTADORES, CRIPTOLOGIA, ANÁLISE DE REQUISITOS, REDES DE COMPUTADORES, SEGURANÇA DE COMPUTADORESL

    Acesso à fonteDOIHow to cite
    A citação é gerada automaticamente e pode não estar totalmente de acordo com as normas
    • ABNT

      RODRIGUES, Mariana e PIGATTO, Daniel F. e BRANCO, Kalinka Regina Lucas Jaquie Castelo. Cloud-SPHERE: a security approach for connected unmanned aerial vehicles. 2018, Anais.. Los Alamitos, CA: IEEE, 2018. Disponível em: https://doi.org/10.1109/ICUAS.2018.8453302. Acesso em: 06 nov. 2024.
    • APA

      Rodrigues, M., Pigatto, D. F., & Branco, K. R. L. J. C. (2018). Cloud-SPHERE: a security approach for connected unmanned aerial vehicles. In Proceedings. Los Alamitos, CA: IEEE. doi:10.1109/ICUAS.2018.8453302
    • NLM

      Rodrigues M, Pigatto DF, Branco KRLJC. Cloud-SPHERE: a security approach for connected unmanned aerial vehicles [Internet]. Proceedings. 2018 ;[citado 2024 nov. 06 ] Available from: https://doi.org/10.1109/ICUAS.2018.8453302
    • Vancouver

      Rodrigues M, Pigatto DF, Branco KRLJC. Cloud-SPHERE: a security approach for connected unmanned aerial vehicles [Internet]. Proceedings. 2018 ;[citado 2024 nov. 06 ] Available from: https://doi.org/10.1109/ICUAS.2018.8453302

Digital Library of Intellectual Production of Universidade de São Paulo     2012 - 2024