Secure computation protocol of Chebyshev distance under the malicious model
Secure multi-party computation of Chebyshev distance represents a crucial method for confidential distance measurement, holding significant theoretical and practical implications.
Xin Liu +7 more
doaj +1 more source
A novel 1D powered Chebyshev quadratic map-based image encryption using dynamic permutation-diffusion. [PDF]
Sarra B, Sun H, Dua M, Dua S, Dhingra D.
europepmc +1 more source
An Intelligent Multi-Task Supply Chain Model Based on Bio-Inspired Networks. [PDF]
Khaleghi M +3 more
europepmc +1 more source
Lightweight three-factor authentication protocol for 6G-enabled healthcare systems using Chebyshev chaotic maps and BioHashing. [PDF]
Abbas AM, Nasr ME, Abdelfatah RI.
europepmc +1 more source
Chebyshev centers and radii for sets induced by quadratic matrix inequalities. [PDF]
Shakouri A, van Waarde HJ, Camlibel MK.
europepmc +1 more source
Modeling and analysis of fascioliasis disease with Katugampola fractional derivative: a memory-incorporated epidemiological approach. [PDF]
Pandey RK, Nisar KS.
europepmc +1 more source
Multi-factor authentication and key agreement scheme based on PUF and Chebyshev chaotic map for wireless sensor networks. [PDF]
Wang L, Han C.
europepmc +1 more source
Interval-aware optimal control of PMSG-based wind energy conversion systems via piecewise Chebyshev inclusion. [PDF]
Razmjooy N.
europepmc +1 more source

