Amanote Research

Amanote Research

    RegisterSign In

Discover open access scientific publications

Search, annotate, share and cite publications


Publications by Elaine Barker

Recommendation for Cryptographic Key Generation

2019English

Related publications

RSA Cryptographic Key Generation Using Fingerprint Minutiae

Iraqi Journal for Computers and Informatics
2014English

Cryptographic Key Generation Based on Contextual Information: A Review

International Journal of Computer Applications
2016English

Selecting Cryptographic Key Sizes

Journal of Cryptology
Applied MathematicsComputer Science ApplicationsSoftware
2001English

Next Generation Cryptographic Ransomware

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2018English

Cryptographic Algorithms and Key Sizes for Personal Identity Verification

2010English

Cryptographic Algorithms and Key Sizes for Personal Identity Verification

2007English

NSA's Cryptographic Message Syntax (CMS) Key Management Attributes

2016English

A Systemic View of One-Pass Cryptographic Key Distribution Techniques for WSNs

International Journal of Innovative Technology and Exploring Engineering
Mechanics of MaterialsElectronic EngineeringCivilStructural EngineeringElectricalComputer Science
2019English

Implementing Aggregate-Key for Sharing Data in Cloud Environment Using Cryptographic Encryption

International Journal of Innovative Technology and Exploring Engineering
Mechanics of MaterialsElectronic EngineeringCivilStructural EngineeringElectricalComputer Science
2019English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy