-
61
Supply chain dynamic multi-center coordination authentication model based on block chain
Published 2016-01-01Subjects: Get full text
Article -
62
A Comprehensive Analysis of Cryptographic Algorithms: Evaluating Security, Efficiency, and Future Challenges
Published 2025-01-01Subjects: Get full text
Article -
63
HashTrie:a space-efficient multiple string matching algorithm
Published 2015-10-01Subjects: Get full text
Article -
64
Secure network coding scheme for scalable video streaming
Published 2013-05-01Subjects: Get full text
Article -
65
Verifiably secure fast group authentication protocol with anonymous traceability for Internet of vehicles
Published 2021-06-01Subjects: Get full text
Article -
66
Secure sensitive data deduplication schemes based on deterministic/probabilistic proof of file ownership
Published 2015-09-01Subjects: Get full text
Article -
67
Design of concatenated Hash-Polar code based on segmented CRC code
Published 2022-07-01Subjects: Get full text
Article -
68
A New Trend in Cryptographic Information Security for Industry 5.0: A Systematic Review
Published 2024-01-01Subjects: Get full text
Article -
69
Private-preserving scientific computation of the rational numbers
Published 2022-06-01Subjects: Get full text
Article -
70
Improved preimage and pseudo-collision attacks on SM3 hash function
Published 2018-01-01Subjects: “…SM3 hash function…”
Get full text
Article -
71
A Stable Hash Function Based on Parity-Dependent Quantum Walks With Memory (August 2023)
Published 2024-01-01Subjects: Get full text
Article -
72
Memory contents patch based virtual machine synchronization
Published 2012-09-01Subjects: Get full text
Article -
73
One-way hash function construction based on Chen-type hyper-chaotic system and key-stream
Published 2009-01-01Subjects: “…one-way hash function…”
Get full text
Article -
74
Enhanced Lightweight Quantum Key Distribution Protocol for Improved Efficiency and Security
Published 2025-01-01Subjects: Get full text
Article -
75
Provably secure quantum resistance two-server password-authenticated key exchange protocol
Published 2022-03-01Subjects: Get full text
Article -
76
Intragroup and Intergroup Pairwise Key Predistribution for Wireless Sensor Networks
Published 2024-12-01Subjects: Get full text
Article -
77
Enhanced Image Retrieval Using Multiscale Deep Feature Fusion in Supervised Hashing
Published 2025-01-01Subjects: Get full text
Article -
78
Enhancing Camera Source Identification: A Rapid Algorithm with Enhanced Discriminative Power
Published 2024-12-01Subjects: Get full text
Article -
79
Analysis of the amplitude form of the quantum hash function
Published 2023-11-01Subjects: Get full text
Article -
80
An LSH Based Time Subsequence Matching Algorithm
Published 2015-08-01Subjects: Get full text
Article