ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Method of securely transferring programmable packet using digital signatures having access-controlled high-security verification key
Mapping Intimacies
◽
10.1109/icact.2005.246179
◽
2005
◽
Author(s):
Youngsoo Kim
◽
Tackyong Nam
Keyword(s):
Digital Signatures
◽
High Security
◽
Security Verification
Download Full-text
Related Documents
Cited By
References
Inpatients Formally Detained in Hospitals Under the Mental Health Act 1983 and Other Legislation: NHS Trusts, High Security Psychiatric Hospitals and Private Facilities: 1999-2000
PsycEXTRA Dataset
◽
10.1037/e623452007-001
◽
2001
◽
Keyword(s):
Mental Health
◽
Psychiatric Hospitals
◽
Mental Health Act
◽
High Security
Download Full-text
FPGA Implementation of MC-CDMA for High Security Applications
CVR Journal of Science & Technology
◽
10.32377/cvrjst0507
◽
2013
◽
Vol 5
(1)
◽
pp. 36-41
Author(s):
R. Ganesh
◽
◽
Ch. Sandeep Reddy
◽
Keyword(s):
Fpga Implementation
◽
Security Applications
◽
High Security
Download Full-text
Information technology. Security techniques. Digital signatures with appendix
10.3403/01829041u
◽
2015
◽
Keyword(s):
Information Technology
◽
Digital Signatures
◽
Information Technology Security
Download Full-text
Information technology. Security techniques. Digital signatures with appendix
10.3403/01829041
◽
2000
◽
Keyword(s):
Information Technology
◽
Digital Signatures
◽
Information Technology Security
Download Full-text
Information technology. Security techniques. Specification of TTP services to support the application of digital signatures
10.3403/02524140u
◽
2015
◽
Keyword(s):
Information Technology
◽
Digital Signatures
◽
Information Technology Security
Download Full-text
Information technology. Security techniques. Anonymous digital signatures
10.3403/30236962
◽
2013
◽
Keyword(s):
Information Technology
◽
Digital Signatures
◽
Information Technology Security
Download Full-text
Information technology. Security techniques. Anonymous digital signatures
10.3403/bsisoiec20008
◽
2015
◽
Keyword(s):
Information Technology
◽
Digital Signatures
◽
Information Technology Security
Download Full-text
Security Verification in Web Browser Extensions
SSRN Electronic Journal
◽
10.2139/ssrn.3168418
◽
2018
◽
Cited By ~ 1
Author(s):
Chinmay Agarwal
◽
Medhavini Kulshrestha
◽
Himanshu Rathore
◽
Kamalakannan J
Keyword(s):
Web Browser
◽
Security Verification
◽
Browser Extensions
Download Full-text
Temperature Distribution Characteristics of a New Superconducting Energy Pipeline Structure with High Security
2020 IEEE International Conference on Applied Superconductivity and Electromagnetic Devices (ASEMD)
◽
10.1109/asemd49065.2020.9276097
◽
2020
◽
Author(s):
Jinhui Luo
◽
Bin Xiang
◽
Peng Xue
◽
Xiaohua Jiang
Keyword(s):
Temperature Distribution
◽
Distribution Characteristics
◽
High Security
Download Full-text
Experimental SCADA Platform Using Digital Signatures
2020 21th International Carpathian Control Conference (ICCC)
◽
10.1109/iccc49264.2020.9257213
◽
2020
◽
Author(s):
Marius Marian
◽
Dan Popescu
◽
Florin Stinga
◽
Adelin Cusman
◽
Dragoa Ionica
Keyword(s):
Digital Signatures
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close