-
241
A dual speech encryption algorithm based on improved Henon mapping and hyperchaotic
Published 2021-12-01Subjects: “…speech encryption…”
Get full text
Article -
242
Privacy-preserving incentive mechanism for integrated demand response: A homomorphic encryption-based approach
Published 2025-03-01Subjects: Get full text
Article -
243
Identity-based encryption scheme against adaptive leakage
Published 2012-07-01Subjects: Get full text
Article -
244
High-performance and high-concurrency encryption scheme for Hadoop platform
Published 2019-12-01Subjects: Get full text
Article -
245
Privacy-preserving ADP for secure tracking control of AVRs against unreliable communication
Published 2025-01-01Subjects: Get full text
Article -
246
Multi-user collaborative access control scheme in cloud storage
Published 2016-01-01Subjects: Get full text
Article -
247
Multi-authority attribute-based encryption with efficient user revocation in cloud computing
Published 2016-02-01Subjects: Get full text
Article -
248
Fine-grained access control scheme with user privacy protection in cloud storage systems
Published 2014-11-01Subjects: Get full text
Article -
249
Encrypted image retrieval in multi-key settings based on edge computing
Published 2020-04-01Subjects: Get full text
Article -
250
Encrypted Engagement: Mapping Messaging App Use in European News Consumption Patterns
Published 2025-01-01Subjects: Get full text
Article -
251
CS-FL: Cross-Zone Secure Federated Learning with Blockchain and a Credibility Mechanism
Published 2024-12-01Subjects: Get full text
Article -
252
An encryption algorithm for multiple medical images based on a novel chaotic system and an odd-even separation strategy
Published 2025-01-01Subjects: Get full text
Article -
253
Secure hidden keyword searchable encryption schemewith fine-grained and flexible access control
Published 2013-08-01Subjects: Get full text
Article -
254
On the Search for Supersingular Elliptic Curves and Their Applications
Published 2025-01-01Subjects: Get full text
Article -
255
Reversible data hiding in encrypted images with high payload
Published 2022-07-01Subjects: Get full text
Article -
256
A Survey of Blockchain Applications for Management in Agriculture and Livestock Internet of Things
Published 2025-01-01Subjects: Get full text
Article -
257
Stochastic job stream scheduling method for cipher chip with multi-cryptography
Published 2016-12-01Subjects: “…cross encryption and decryption…”
Get full text
Article -
258
A Comprehensive Analysis of Cryptographic Algorithms: Evaluating Security, Efficiency, and Future Challenges
Published 2025-01-01Subjects: “…Advanced encryption standard…”
Get full text
Article -
259
Classification auditting scheme for privacy protection of outsourced EHR based on distributed storage
Published 2024-09-01Subjects: “…attribute-based searchable encryption…”
Get full text
Article -
260
Block level cloud data deduplication scheme based on attribute encryption
Published 2023-10-01Subjects: Get full text
Article