Amanote Research
Register
Sign In
Discover open access scientific publications
Search, annotate, share and cite publications
Publications by Elaine Barker
Recommendation for Cryptographic Key Generation
Related publications
RSA Cryptographic Key Generation Using Fingerprint Minutiae
Iraqi Journal for Computers and Informatics
Cryptographic Key Generation Based on Contextual Information: A Review
International Journal of Computer Applications
Selecting Cryptographic Key Sizes
Journal of Cryptology
Applied Mathematics
Computer Science Applications
Software
Next Generation Cryptographic Ransomware
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Cryptographic Algorithms and Key Sizes for Personal Identity Verification
Cryptographic Algorithms and Key Sizes for Personal Identity Verification
NSA's Cryptographic Message Syntax (CMS) Key Management Attributes
A Systemic View of One-Pass Cryptographic Key Distribution Techniques for WSNs
International Journal of Innovative Technology and Exploring Engineering
Mechanics of Materials
Electronic Engineering
Civil
Structural Engineering
Electrical
Computer Science
Implementing Aggregate-Key for Sharing Data in Cloud Environment Using Cryptographic Encryption
International Journal of Innovative Technology and Exploring Engineering
Mechanics of Materials
Electronic Engineering
Civil
Structural Engineering
Electrical
Computer Science