Abstract: In this paper, authentication for mobile radio frequency identification (RFID) systems with low-cost tags is investigated. To this end, an adaptive modulus (AM) encryption algorithm is first ...
Abstract: In recent years, social network applications on mobile devices have become very popular. However, its constantly growing user base and significance to many industries presents challenges in ...
Quantum computers are coming. And when they arrive, they are going to upend the way we protect sensitive data. Unlike classical computers, quantum computers harness quantum mechanical effects — like ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results