-
301
Applying TTIED-CMYK Algorithm in Wireless Sensor Networks Based on Raspberry pi and DHT-11
Published 2022-09-01Subjects: “…Text-to-Image Encryption (TTIE)…”
Get full text
Article -
302
Lightweight searchable medical data sharing scheme
Published 2022-05-01Subjects: Get full text
Article -
303
-
304
Two-Party Quantum Private Comparison Protocol Based on Rotational Encryption
Published 2025-01-01Subjects: Get full text
Article -
305
Approach of location privacy protection based on order preserving encryption of the grid
Published 2017-07-01Subjects: Get full text
Article -
306
Secure fault-tolerant code for cloud storage
Published 2014-03-01Subjects: “…threshold public-key encryption…”
Get full text
Article -
307
Image encryption algorithm based on multi-direction pixel continuous folding mechanism and Radon transform
Published 2017-09-01Subjects: “…image encryption…”
Get full text
Article -
308
Triple receiver public key encryption cryptosystem
Published 2020-12-01Subjects: Get full text
Article -
309
Contextual access control based on attribute-based encryption with hidden lattice structure for removable storage media
Published 2014-04-01Subjects: “…attribute-based encryption…”
Get full text
Article -
310
k-times attribute-based authentication scheme using direct anonymous attestation
Published 2018-12-01Subjects: “…ciphertext-policy attribute-based encryption…”
Get full text
Article -
311
A Novel Approach for Safeguarding Kurdish Text Files via Modified AES-OTP and Enhanced RSA Cryptosystem on Unreliable Networks
Published 2024-06-01Subjects: Get full text
Article -
312
Protecting Medical Images Using a Zero-Watermarking Approach Based on Fractional Racah Moments
Published 2025-01-01Subjects: Get full text
Article -
313
AONT-and-NTRU-based rekeying scheme for encrypted deduplication
Published 2021-10-01Subjects: Get full text
Article -
314
-
315
SDRG-Net: Integrating multi-level color transformation encryption and ICNN-IRDO feature analysis for robust diabetic retinopathy diagnosis
Published 2025-03-01Subjects: Get full text
Article -
316
Harnessing the potential of shared data in a secure, inclusive, and resilient manner via multi-key homomorphic encryption
Published 2024-06-01Subjects: “…Multi-key homomorphic encryption…”
Get full text
Article -
317
Multi-keyword search over encrypted data with user revocation
Published 2017-08-01Subjects: “…searchab1e encryption…”
Get full text
Article -
318
A Method to Attack the FHE Schemes Based on the Hardness of PACDP
Published 2013-03-01Subjects: “…fu11y homomorphic encryption…”
Get full text
Article -
319
Cross-Chain Identity Authentication Method Based on Relay Chain
Published 2025-01-01Subjects: Get full text
Article -
320
Encrypted traffic identification scheme based on sliding window and randomness features
Published 2024-08-01Subjects: “…encrypted traffic…”
Get full text
Article