Showing 40 - 52 of 261
View by: Cover Page List Articles
-
Enhanced lightweight and compromised-resilient image encryption for resource constrained environments
published 26 Mar 2025
Loading metrics information...
Metrics unavailable. Please check back later.
-
An efficient detection of Sinkhole attacks using machine learning: Impact on energy and security
published 17 Mar 2025
Loading metrics information...
Metrics unavailable. Please check back later.
-
A verifiably secure and robust authentication protocol for synergistically-assisted IoD deployment drones
published 10 Mar 2025
Loading metrics information...
Metrics unavailable. Please check back later.
-
Crypto-coding technique based on polar code and secret key generated from wireless channel characteristics for wireless communication systems
published 25 Feb 2025
Loading metrics information...
Metrics unavailable. Please check back later.
-
A certificateless aggregate signature scheme for VANETs with privacy protection properties
published 20 Feb 2025
Loading metrics information...
Metrics unavailable. Please check back later.
-
Privacy-preserving method for face recognition based on homomorphic encryption
published 11 Feb 2025
Loading metrics information...
Metrics unavailable. Please check back later.
-
Design and analysis of lightweight and robust authentication protocol for securing the resource constrained IIoT environment
published 06 Feb 2025
Loading metrics information...
Metrics unavailable. Please check back later.
-
A sector fast encryption algorithm for color images based on one-dimensional composite sinusoidal chaos map
published 24 Jan 2025
Loading metrics information...
Metrics unavailable. Please check back later.
-
Enterprise internal audit data encryption based on blockchain technology
published 10 Jan 2025
Loading metrics information...
Metrics unavailable. Please check back later.
-
Secure privacy-preserving record linkage system from re-identification attack
published 09 Jan 2025
Loading metrics information...
Metrics unavailable. Please check back later.
-
Cross-layer latency analysis for 5G NR in V2X communications
published 09 Jan 2025
Loading metrics information...
Metrics unavailable. Please check back later.
-
The privacy protection of the internet of vehicles resource transaction details based on blockchain
published 03 Jan 2025
Loading metrics information...
Metrics unavailable. Please check back later.
-
Quantum-resilient software security: A fuzzy AHP-based assessment framework in the era of quantum computing
published 30 Dec 2024
Loading metrics information...
Metrics unavailable. Please check back later.
Connect with Us