Showing 40 - 52 of 414
View by: Cover Page List Articles
-
A ZKP-based anonymous biometric authentication scheme for the E-health systems
published 17 Jun 2025
Loading metrics information...
Metrics unavailable. Please check back later.
-
A machine learning based authentication and intrusion detection scheme for IoT users anonymity preservation in fog environment
published 16 Jun 2025
Loading metrics information...
Metrics unavailable. Please check back later.
-
Hyperchaotic color image encryption using eight-base DNA complementary rules and extended Zigzag transform
published 12 Jun 2025
Loading metrics information...
Metrics unavailable. Please check back later.
-
Coli bond: A dual-function encryption system for secure information storage and transmission by microorganisms
published 11 Jun 2025
Loading metrics information...
Metrics unavailable. Please check back later.
-
A provably secure coercion-resistant e-voting scheme with confidentiality, anonymity, unforgeability, and CAI verifiability
published 09 Jun 2025
Loading metrics information...
Metrics unavailable. Please check back later.
-
Where octagonal geometry meets chaos: A new S-Box for advanced cryptographic systems
published 09 Jun 2025
Loading metrics information...
Metrics unavailable. Please check back later.
-
A location privacy protection method based on blockchain and threshold cryptography
published 04 Jun 2025
Loading metrics information...
Metrics unavailable. Please check back later.
-
Security importance of edge-IoT ecosystem: An ECC-based authentication scheme
published 04 Jun 2025
Loading metrics information...
Metrics unavailable. Please check back later.
-
Blockchain enabled privacy provisioning scheme for location based services in VANETs
published 03 Jun 2025
Loading metrics information...
Metrics unavailable. Please check back later.
-
A cloud-assisted key agreement protocol for the E-healthcare system
published 03 Jun 2025
Loading metrics information...
Metrics unavailable. Please check back later.
-
MSD: Multi-stage deception for data privacy protection
published 02 Jun 2025
Loading metrics information...
Metrics unavailable. Please check back later.
-
Bio-inspired cryptography based on proteinoid assemblies
published 28 May 2025
Loading metrics information...
Metrics unavailable. Please check back later.
-
A simple and efficient attack on the Merkle-Hellman knapsack cryptosystem
published 28 May 2025
Loading metrics information...
Metrics unavailable. Please check back later.
Connect with Us