-
1
A Review of Artificial Intelligence (AI) Applications in Key Generation for Encryption Algorithms
Published 2025-03-01Subjects: “…AI Applications, key generation, encryption algorithms, string, image…”
Get full text
Article -
2
Predicting Diabetes Mellitus with Machine Learning Techniques
Published 2025-06-01Subjects: “…AES, RSA, ECC, ChaCha20, Hybrid Algorithms and Encryption Algorithms.…”
Get full text
Article -
3
HARDWARE SUPPORT PROCEDURES FOR ASYMMETRIC AUTHENTICATION OF THE INTERNET OF THINGS
Published 2021-12-01Subjects: Get full text
Article -
4
Application of Algorithms on Lattices in Post-Quantum Cryptography
Published 2024-03-01Subjects: “…post-quantum encryption algorithms…”
Get full text
Article -
5
Applying Quran Security and Hamming CodesFor Preventing of Text Modification
Published 2011-06-01Subjects: “…Security systems, Hamming Codes, Error detection and correction, Encryption algorithms, public key encryption, RSA Encryption Algorithm…”
Get full text
Article -
6
Enhancing Cloud Security: A Multi-Factor Authentication and Adaptive Cryptography Approach Using Machine Learning Techniques
Published 2025-01-01Subjects: Get full text
Article -
7
Research on the Trusted Traceability Model of Taishan Tea Products Based on Blockchain
Published 2024-11-01Subjects: Get full text
Article -
8
Control research and application of conventional operations without real-time networks
Published 2020-01-01Subjects: “…remote non-network;encryption algorithm;convention;agreed time…”
Get full text
Article -
9
Integral Imaging Based Optical Image Encryption Using CA-DNA Algorithm
Published 2021-01-01Subjects: “…Optical encryption algorithm…”
Get full text
Article -
10
Image encryption scheme based on compressed sensing and fractional quantum logistic-tent map
Published 2025-04-01Subjects: Get full text
Article -
11
A Hybrid Chinese National Cryptographic Algorithm Based Solution for Data Encryption and Decryption in Transmission
Published 2023-08-01Subjects: Get full text
Article -
12
Secure Image Transmission Using Multilevel Chaotic Encryption and Video Steganography
Published 2025-07-01Subjects: “…AES encryption algorithm…”
Get full text
Article -
13
Blockchain-based optimization of operation and trading among multiple microgrids considering market fairness
Published 2025-05-01Subjects: Get full text
Article -
14
RESEARCH OF PARAMETERS OF ENCODING OF THE ALGORITHM WITH VARIABLE FRAGMENTATION OF THE UNIT
Published 2018-06-01Subjects: Get full text
Article -
15
Security protection method based on mimic defense and Paillier encryption for smart IoT terminals
Published 2024-12-01Subjects: Get full text
Article -
16
Wireless sensor security communication and anti-leak locating technology based on region partition in power mobile inspection
Published 2016-02-01Subjects: “…private key and timestamp cross certification;high strength encryption algorithm suite;leak proof private key…”
Get full text
Article -
17
Medical data privacy protection based on blockchain asymmetric encryption algorithm and generative adversarial network
Published 2025-02-01Subjects: “…blockchain asymmetric encryption algorithm…”
Get full text
Article -
18
A hybrid encryption algorithm based approach for secure privacy protection of big data in hospitals
Published 2024-12-01Subjects: Get full text
Article