-
21
Design and implementation of low-cost hardware architecture for authentication encryption algorithm SM4-GCM
Published 2023-12-01Subjects: Get full text
Article -
22
A Survey of Efficient Lightweight Cryptography for Power-Constrained Microcontrollers
Published 2024-12-01Subjects: Get full text
Article -
23
Cloud Storage Data Protection Mechanism Based on a Fingerprint Cube Algorithm
Published 2014-11-01Subjects: Get full text
Article -
24
Research and practice on power big data security governance system
Published 2019-11-01Subjects: Get full text
Article -
25
Time based incremental backup scheme for mobile cloud computing
Published 2016-08-01Subjects: Get full text
Article -
26
Research and implementation of data security for mobile terminal based on TEE
Published 2017-03-01Subjects: Get full text
Article -
27
A deep learning-driven multi-layered steganographic approach for enhanced data security
Published 2025-02-01Subjects: “…Data security…”
Get full text
Article -
28
Blockchain-based cross-data center anonymous and verifiable identity authentication scheme
Published 2024-04-01Subjects: “…data security…”
Get full text
Article -
29
Federated edge learning model based on multi-level proxy permissioned blockchain
Published 2024-04-01Subjects: Get full text
Article -
30
Mobile office system oriented to intelligent terminal
Published 2018-02-01Subjects: Get full text
Article -
31
Overview of the data security and privacy-preserving of mobile cloud services
Published 2013-12-01Subjects: Get full text
Article -
32
Stealthy data poisoning attack method on offline reinforcement learning in unmanned systems
Published 2024-12-01Subjects: Get full text
Article -
33
Technology and practice of intelligent governance for financial data security
Published 2023-06-01Subjects: “…financial data security…”
Get full text
Article -
34
-
35
Trusted secure model for data services in cloud computing
Published 2014-10-01Subjects: Get full text
Article -
36
A Project Designed by Cloud Storage Encryption Based on Separated Key
Published 2013-01-01Subjects: Get full text
Article -
37
Data security challenges and countermeasures in financial technology
Published 2019-08-01Subjects: Get full text
Article -
38
Graph database based security protection mechanism of 5G network data flow
Published 2021-04-01Subjects: Get full text
Article -
39
Dynamic game and reliable recommendation based transferring reputation mechanism for mobile cloud computing
Published 2018-05-01Subjects: Get full text
Article -
40