EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: subject:"Public-Key Cryptography"
Narrow search

Narrow search

Year of publication
Subject
All
Data security 2 Datensicherheit 2 Accounting 1 Audit 1 Bit Forwarding 1 Bitcoin 1 Blockchain 1 Combined public key cryptography (CPK) 1 Computerized method 1 Computerunterstützung 1 Confidence 1 Data Confidentiality 1 Design science 1 Faithful representation 1 Financial reporting 1 Identity 1 Image Security 1 Modular Exponentiation 1 Modular Multiplication 1 Montgomery Multiplication 1 Multiparty security 1 Public Key Cryptography 1 Public key cryptography 1 Public-Key Cryptography 1 Random Grids 1 Rechnungswesen 1 Remote attestation 1 Trusted computing 1 Trusted platform module (TPM) 1 Vertrauen 1 Visual Cryptography 1 digital currency 1 peer-to-peer network 1 public-key cryptography 1 virtual currency 1
more ... less ...
Online availability
All
Undetermined 4 Free 1
Type of publication
All
Article 5
Type of publication (narrower categories)
All
Article in journal 2 Aufsatz in Zeitschrift 2
Language
All
English 4 Undetermined 1
Author
All
Begum, B. Shameedha 1 Das, Manik Lal 1 Fajiang, Yu 1 Jiacheng, Zhu 1 Jing, Chen 1 Joshi, Amit D. 1 McCallig, John 1 Ramasubramanian, N. 1 Robb, Alastair 1 Rohde, Fiona 1 SUDACEVSCHI, Mihaela 1 Saranjame, Rahul 1 Vollala, Satyanarayana 1 Xiang, Yang 1 Yangdi, Zhao 1
more ... less ...
Published in...
All
Electronic commerce research 1 International Journal of Computer Vision and Image Processing (IJCVIP) 1 International Journal of Information Security and Privacy (IJISP) 1 International journal of accounting information systems 1 Management Intercultural 1
Source
All
ECONIS (ZBW) 2 Other ZBW resources 2 RePEc 1
Showing 1 - 5 of 5
Cover Image
BITCOIN – THE NEW KIND OF MONEY
SUDACEVSCHI, Mihaela - In: Management Intercultural (2013) 29, pp. 340-348
Bitcoin is a new kind of money, which means a digital currency which can be used for commercial purposes. Over time, the trade has evolved from barter to the use of the precious metals as money, then to the coins with intrinsic value and to the symbol coins and later to the use of the electronic...
Persistent link: https://www.econbiz.de/10010700624
Saved in:
Cover Image
Bit Forwarding 3-Bits Technique for Efficient Modular Exponentiation
Vollala, Satyanarayana; Begum, B. Shameedha; Joshi, Amit D. - In: International Journal of Information Security and … 11 (2017) 2, pp. 11-24
It is widely recognized that the public-key cryptosystems are playing tremendously an important role for providing the security services. In majority of the cryptosystems the crucial arithmetic operation is modular exponentiation. It is composed of a series of modular multiplications. Hence, the...
Persistent link: https://www.econbiz.de/10012045690
Saved in:
Cover Image
Establishing the representational faithfulness of financial accounting information using multiparty security, network analysis and a blockchain
McCallig, John; Robb, Alastair; Rohde, Fiona - In: International journal of accounting information systems 33 (2019), pp. 47-58
Persistent link: https://www.econbiz.de/10012038449
Saved in:
Cover Image
An efficient anonymous remote attestation scheme for trusted computing based on improved CPK
Fajiang, Yu; Jing, Chen; Xiang, Yang; Jiacheng, Zhu; … - In: Electronic commerce research 19 (2019) 3, pp. 689-718
Persistent link: https://www.econbiz.de/10012099786
Saved in:
Cover Image
Securing Digital Image from Malicious Insider Attacks
Saranjame, Rahul; Das, Manik Lal - In: International Journal of Computer Vision and Image … 8 (2018) 2, pp. 49-58
Protection of digital images from malicious (and dishonest) insider entities is an important concern in modern digital space. A malicious entity can alter some important features of an image to mislead the target recipient of the image, which can cause harm in applications such as healthcare,...
Persistent link: https://www.econbiz.de/10012043851
Saved in:
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...