-
81
Individual health passport storage, sharing and verification scheme based on blockchain
Published 2024-04-01Subjects: Get full text
Article -
82
An Image Sharing Encryption Management System For Kabale University.
Published 2024Subjects: Get full text
Thesis -
83
Redesigning the Serpent Algorithm by PA-Loop and Its Image Encryption Application
Published 2023-01-01Subjects: Get full text
Article -
84
An efficient medical data encryption scheme using selective shuffling and inter-intra pixel diffusion IoT-enabled secure E-healthcare framework
Published 2025-02-01Subjects: Get full text
Article -
85
High-capacity image steganography algorithm combining image encryption and deep learning
Published 2021-09-01Subjects: Get full text
Article -
86
Privacy-preserving trajectory similarity computation method
Published 2022-11-01Subjects: Get full text
Article -
87
Dynamic multi-keyword searchable encryption scheme
Published 2023-04-01Subjects: “…searchable encryption…”
Get full text
Article -
88
Location privacy preserving scheme against attack from friends in SNS
Published 2016-10-01Subjects: Get full text
Article -
89
A New Chaotic Color Image Encryption Algorithm Based on Memristor Model and Random Hybrid Transforms
Published 2025-01-01Subjects: Get full text
Article -
90
Implementation of shared file encrypted storage hierarchical access control scheme
Published 2016-07-01Subjects: Get full text
Article -
91
Accelerated algorithm in attribute-based encryption over cloud environment
Published 2019-11-01Subjects: Get full text
Article -
92
Integrity verification protocol based on privacy homomorphism data aggregation
Published 2014-11-01Subjects: Get full text
Article -
93
Multi-authority attribute-based encryption with efficient revocation
Published 2017-03-01Subjects: “…attribute-based encryption…”
Get full text
Article -
94
Blockchain-based noisy data sharing control protocol
Published 2023-10-01Subjects: Get full text
Article -
95
Preserving data privacy in social recommendation
Published 2015-12-01Subjects: Get full text
Article -
96
Testing the Strength of Chaotic Systems as Seeds in a Pseudo Random Bit Generator
Published 2025-01-01Subjects: Get full text
Article -
97
Image encryption algorithms based on chaos through dual scrambling of pixel position and bit
Published 2014-03-01Subjects: “…image encryption…”
Get full text
Article -
98
Efficient hybrid-encryption-based optimistic Mix-net protocol
Published 2014-11-01Subjects: Get full text
Article -
99
Protected Private Information for Proximity Computingin Mobile Social Network
Published 2013-10-01Subjects: Get full text
Article -
100
Privacy matching-based service proxy discovery scheme
Published 2016-08-01Subjects: Get full text
Article