-
41
Privacy-preserving ADP for secure tracking control of AVRs against unreliable communication
Published 2025-01-01Subjects: Get full text
Article -
42
Encrypted Engagement: Mapping Messaging App Use in European News Consumption Patterns
Published 2025-01-01Subjects: Get full text
Article -
43
An encryption algorithm for multiple medical images based on a novel chaotic system and an odd-even separation strategy
Published 2025-01-01Subjects: Get full text
Article -
44
On the Search for Supersingular Elliptic Curves and Their Applications
Published 2025-01-01Subjects: Get full text
Article -
45
Reversible data hiding in encrypted images with high payload
Published 2022-07-01Subjects: Get full text
Article -
46
A Survey of Blockchain Applications for Management in Agriculture and Livestock Internet of Things
Published 2025-01-01Subjects: Get full text
Article -
47
A Comprehensive Analysis of Cryptographic Algorithms: Evaluating Security, Efficiency, and Future Challenges
Published 2025-01-01Subjects: “…Advanced encryption standard…”
Get full text
Article -
48
-
49
Crayfish optimization based pixel selection using block scrambling based encryption for secure cloud computing environment
Published 2025-01-01Subjects: Get full text
Article -
50
A New Trend in Cryptographic Information Security for Industry 5.0: A Systematic Review
Published 2024-01-01Subjects: Get full text
Article -
51
Image vaccine against steganography in encrypted domain
Published 2025-02-01Subjects: Get full text
Article -
52
Image Encryption Method Based on Three-Dimensional Chaotic Systems and V-Shaped Scrambling
Published 2025-01-01Subjects: “…image encryption…”
Get full text
Article -
53
Application of edge computing technology in smart grid data security
Published 2025-02-01Subjects: “…No certificate proxy blind signature encryption…”
Get full text
Article -
54
Flexible Threshold Quantum Homomorphic Encryption on Quantum Networks
Published 2024-12-01Subjects: “…threshold quantum homomorphic encryption…”
Get full text
Article -
55
Security protection method based on mimic defense and Paillier encryption for smart IoT terminals
Published 2024-12-01Subjects: Get full text
Article -
56
Protection of personal data under martial law in Ukraine
Published 2023-09-01Subjects: Get full text
Article -
57
Double Security Level Protection Based on Chaotic Maps and SVD for Medical Images
Published 2025-01-01Subjects: Get full text
Article -
58
Beyond full‐bit secure authenticated encryption without input‐length limitation
Published 2022-07-01Subjects: “…authenticated encryption…”
Get full text
Article -
59
Applying TTIED-CMYK Algorithm in Wireless Sensor Networks Based on Raspberry pi and DHT-11
Published 2022-09-01Subjects: “…Text-to-Image Encryption (TTIE)…”
Get full text
Article -
60