-
1
Research on optimization of indoor positioning batch ranging system based on DS-TWR algorithm
Published 2022-01-01Subjects: Get full text
Article -
2
Blockchain covert communication scheme based on the cover of normal transactions
Published 2022-08-01Subjects: Get full text
Article -
3
Mining privacy-preserving association rules using transaction hewer allocator and facile hash algorithm in multi-cloud environments
Published 2025-06-01Subjects: “…Facile Hash Algorithm, Transaction Hewer and Allocator, and ATid algorithm…”
Get full text
Article -
4
Illustration visual communication based on computer vision image retrieval algorithm
Published 2025-02-01Subjects: Get full text
Article -
5
Research on stochastic matrix mapping Hash for specific flow matching
Published 2007-01-01Subjects: Get full text
Article -
6
Research on differential properties of Keccak-like nonlinear transform
Published 2012-09-01Subjects: Get full text
Article -
7
A unified elliptic curve cryptographic algorithm for secure communication and homomorphic encryption: A multi-parameter (Built-in CIA) Approach
Published 2025-06-01Subjects: Get full text
Article -
8
Secure gray image sharing framework with adaptive key generation using image digest
Published 2025-03-01Subjects: Get full text
Article -
9
Highly-Efficient Hardware Architecture for ML-KEM PQC Standard
Published 2025-01-01Subjects: Get full text
Article -
10
VHSAP-based approach of defending against DDoS attacks for cloud computing routing platforms
Published 2015-01-01Subjects: Get full text
Article -
11
An Enhanced Text Steganography Technique (SHA-Logic): Based on Conditional Logic and SHA-3 (Secure Hash Algorithm 3)
Published 2024-12-01Subjects: Get full text
Article -
12
DESIGNING THE ARCHITECTURE AND SOFTWARE COMPONENTS OF THE DOCKERISED BLOCKCHAIN MEDIATOR
Published 2025-07-01Subjects: Get full text
Article -
13
Big data processing using hybrid Gaussian mixture model with salp swarm algorithm
Published 2024-11-01Subjects: Get full text
Article