Showing 53 - 65 of 414
View by: Cover Page List Articles
-
Blockchain assisted signature and certificate based protocol for efficient data protection and transaction management in smart grids
published 28 May 2025
Loading metrics information...
Metrics unavailable. Please check back later.
-
Certificateless aggregate signcryption scheme with multi-ciphertext equality test for the internet of vehicles
published 27 May 2025
Loading metrics information...
Metrics unavailable. Please check back later.
-
Area-time efficient pipelined number theoretic transform for CRYSTALS-Kyber
published 14 May 2025
Loading metrics information...
Metrics unavailable. Please check back later.
-
A protocol for the HEaring Impairment Data Infrastructure (HEIDI) study
published 07 May 2025
Loading metrics information...
Metrics unavailable. Please check back later.
-
Privacy-preserving recommender system using the data collaboration analysis for distributed datasets
published 21 Apr 2025
Loading metrics information...
Metrics unavailable. Please check back later.
-
Deep learning-based improved side-channel attacks using data denoising and feature fusion
published 09 Apr 2025
Loading metrics information...
Metrics unavailable. Please check back later.
-
Attribute encryption access control method of high dimensional medical data based on fuzzy algorithm
published 27 Mar 2025
Loading metrics information...
Metrics unavailable. Please check back later.
-
Enhanced lightweight and compromised-resilient image encryption for resource constrained environments
published 26 Mar 2025
Loading metrics information...
Metrics unavailable. Please check back later.
-
CAPPS: Congestion-aware payment and punishment scheme to stimulate selfish nodes in IoT-based VDTNs
published 25 Mar 2025
Loading metrics information...
Metrics unavailable. Please check back later.
-
A study of Mandelbrot and Julia Sets via Picard–Thakur iteration with s-convexity
published 21 Mar 2025
Loading metrics information...
Metrics unavailable. Please check back later.
-
An efficient detection of Sinkhole attacks using machine learning: Impact on energy and security
published 17 Mar 2025
Loading metrics information...
Metrics unavailable. Please check back later.
-
A verifiably secure and robust authentication protocol for synergistically-assisted IoD deployment drones
published 10 Mar 2025
Loading metrics information...
Metrics unavailable. Please check back later.
-
Crypto-coding technique based on polar code and secret key generated from wireless channel characteristics for wireless communication systems
published 25 Feb 2025
Loading metrics information...
Metrics unavailable. Please check back later.
Connect with Us