-
1
Research on the Trusted Traceability Model of Taishan Tea Products Based on Blockchain
Published 2024-11-01Subjects: Get full text
Article -
2
Control research and application of conventional operations without real-time networks
Published 2020-01-01Subjects: “…remote non-network;encryption algorithm;convention;agreed time…”
Get full text
Article -
3
Integral Imaging Based Optical Image Encryption Using CA-DNA Algorithm
Published 2021-01-01Subjects: “…Optical encryption algorithm…”
Get full text
Article -
4
Image encryption scheme based on compressed sensing and fractional quantum logistic-tent map
Published 2025-04-01Subjects: Get full text
Article -
5
A Hybrid Chinese National Cryptographic Algorithm Based Solution for Data Encryption and Decryption in Transmission
Published 2023-08-01Subjects: Get full text
Article -
6
Secure Image Transmission Using Multilevel Chaotic Encryption and Video Steganography
Published 2025-07-01Subjects: “…AES encryption algorithm…”
Get full text
Article -
7
Blockchain-based optimization of operation and trading among multiple microgrids considering market fairness
Published 2025-05-01Subjects: Get full text
Article -
8
RESEARCH OF PARAMETERS OF ENCODING OF THE ALGORITHM WITH VARIABLE FRAGMENTATION OF THE UNIT
Published 2018-06-01Subjects: Get full text
Article -
9
Security protection method based on mimic defense and Paillier encryption for smart IoT terminals
Published 2024-12-01Subjects: Get full text
Article -
10
Wireless sensor security communication and anti-leak locating technology based on region partition in power mobile inspection
Published 2016-02-01Subjects: “…private key and timestamp cross certification;high strength encryption algorithm suite;leak proof private key…”
Get full text
Article -
11
Medical data privacy protection based on blockchain asymmetric encryption algorithm and generative adversarial network
Published 2025-02-01Subjects: “…blockchain asymmetric encryption algorithm…”
Get full text
Article -
12
A hybrid encryption algorithm based approach for secure privacy protection of big data in hospitals
Published 2024-12-01Subjects: Get full text
Article -
13
Applying Quran Security and Hamming CodesFor Preventing of Text Modification
Published 2011-06-01Subjects: “…Security systems, Hamming Codes, Error detection and correction, Encryption algorithms, public key encryption, RSA Encryption Algorithm…”
Get full text
Article -
14
A Review of Artificial Intelligence (AI) Applications in Key Generation for Encryption Algorithms
Published 2025-03-01Subjects: “…AI Applications, key generation, encryption algorithms, string, image…”
Get full text
Article -
15
Predicting Diabetes Mellitus with Machine Learning Techniques
Published 2025-06-01Subjects: “…AES, RSA, ECC, ChaCha20, Hybrid Algorithms and Encryption Algorithms.…”
Get full text
Article -
16
HARDWARE SUPPORT PROCEDURES FOR ASYMMETRIC AUTHENTICATION OF THE INTERNET OF THINGS
Published 2021-12-01Subjects: Get full text
Article -
17
Application of Algorithms on Lattices in Post-Quantum Cryptography
Published 2024-03-01Subjects: “…post-quantum encryption algorithms…”
Get full text
Article -
18
Enhancing Cloud Security: A Multi-Factor Authentication and Adaptive Cryptography Approach Using Machine Learning Techniques
Published 2025-01-01Subjects: Get full text
Article