-
41
On the Search for Supersingular Elliptic Curves and Their Applications
Published 2025-01-01Get full text
Article -
42
A Novel Authentication Management for the Data Security of Smart Grid
Published 2024-01-01Get full text
Article -
43
Huffman coding-based data reduction and quadristego logic for secure image steganography
Published 2025-05-01Get full text
Article -
44
Efficient Dynamic Replicated Data Possession Checking in Distributed Cloud Storage Systems
Published 2016-01-01Get full text
Article -
45
Secure Blockchain Integration Approach for Knowledge Discovery in Industrial Internet of Things
Published 2025-01-01Get full text
Article -
46
Privacy-preserved data hiding using compressive sensing and fuzzy C-means clustering
Published 2020-02-01Get full text
Article -
47
A cross-chain model for warehouse receipts in port supply chain based on notary mechanism and ShangMi cryptographic algorithms
Published 2025-04-01“…The proposed system employs a layered data structure for warehouse receipts and uses differentiated encryption strategies. …”
Get full text
Article -
48
-
49
A Practical Implementation of Post-Quantum Cryptography for Secure Wireless Communication
Published 2025-06-01Get full text
Article -
50
The Alliance of BIM and Artificial Intelligence: Challenges for a Reinvented Future – The State of the Art
Published 2025-06-01Get full text
Article -
51
M-folding method–based elliptic curve cryptosystem for industrial cyber-physical system
Published 2019-10-01Get full text
Article -
52
-
53
Implementation of Personal Health Device Communication Protocol Applying ISO/IEEE 11073-20601
Published 2014-05-01“…Moreover, security is enhanced by applying the international symmetric key encryption standard, advanced encryption standard (AES), for secure data transmission from the weight sensor to gateway. …”
Get full text
Article -
54
Differential cryptanalysis of full-round ANU-II ultra-lightweight block cipher
Published 2022-09-01Get full text
Article -
55
An improved lightweight certificateless generalized signcryption scheme for mobile-health system
Published 2019-01-01Get full text
Article -
56
Secure Sharing of Electronic Medical Records Based on Blockchain
Published 2024-01-01Get full text
Article -
57
-
58
Perturbation-Based Schemes with Ultra-Lightweight Computation to Protect User Privacy in Smart Grid
Published 2013-03-01Get full text
Article -
59
A novel and efficient digital image steganography technique using least significant bit substitution
Published 2025-01-01Get full text
Article -
60
Development of biometric systems for passenger identification based on noise-resistant coding means
Published 2021-04-01“…The use of permutation decoding data algorithms capable of adequately corresponding to the particular problems of biometric identification is proposed. …”
Get full text
Article