-
161
A novel chaotic system with one absolute term: stability, ultimate boundedness, and image encryption
Published 2025-01-01Subjects: Get full text
Article -
162
Secured DICOM medical image transition with optimized chaos method for encryption and customized deep learning model for watermarking
Published 2025-04-01Subjects: Get full text
Article -
163
Destruction strategy for disks based on AES encrypted storage
Published 2018-04-01Subjects: Get full text
Article -
164
Multi-authority based CP-ABE proxy re-encryption scheme for cloud computing
Published 2022-06-01Subjects: Get full text
Article -
165
-
166
Ciphertext policy attribute-based encryption scheme supporting direct revocation
Published 2016-05-01Subjects: “…attribute-based encryption…”
Get full text
Article -
167
New kind of CD-DCSK chaos shift keying secure communication system
Published 2012-05-01Subjects: Get full text
Article -
168
Hybird group key management scheme for wireless sensor networks
Published 2010-01-01Subjects: Get full text
Article -
169
Byzantine-robust federated learning over Non-IID data
Published 2023-06-01Subjects: Get full text
Article -
170
Efficient dynamic searchable encryption scheme for conjunctive queries based on bidirectional index
Published 2022-05-01Subjects: “…dynamic searchable symmetric encryption…”
Get full text
Article -
171
Novel construction of forward-secure public-key encryption in the standard model
Published 2014-02-01Subjects: “…public-key encryption…”
Get full text
Article -
172
AEUR: authenticated encryption algorithm design based on uBlock round function
Published 2023-08-01Subjects: “…authenticated encryption…”
Get full text
Article -
173
Data comparable encryption scheme based on cloud computing in Internet of things
Published 2018-04-01Subjects: “…short comparable encryption…”
Get full text
Article -
174
Traceable attribute-based encryption scheme with key-delegation abuse resistance
Published 2020-04-01Subjects: “…attribute-based encryption…”
Get full text
Article -
175
Research and application of 5G lightweight hardware encryption module for power terminals
Published 2023-06-01Subjects: Get full text
Article -
176
Accelerated Multi-Key Homomorphic Encryption via Automorphism-Based Circuit Bootstrapping
Published 2025-01-01Subjects: “…multi-key homomorphic encryption…”
Get full text
Article -
177
Fused access control scheme for sensitive data sharing
Published 2014-08-01Subjects: Get full text
Article -
178
Chaos-based encryption and message authentication algorithm for wireless sensor network
Published 2013-05-01Subjects: Get full text
Article -
179
Provably secure rational delegation computation protocol
Published 2019-07-01Subjects: Get full text
Article -
180
SparseBatch: Communication-efficient Federated Learning with Partially Homomorphic Encryption
Published 2025-01-01Subjects: “…homomorphic encryption…”
Get full text
Article