Quantum-resilient software security: A fuzzy AHP-based assessment framework in the era of quantum computing. [PDF]
Almotiri SH.
europepmc +1 more source
Using Cryptographic Hash Functions for Discretionary Access Control in Object-Oriented Databases [PDF]
Ahmad Baraani-Dastjerdi+3 more
openalex +1 more source
DNA-Inspired Lightweight Cryptographic Algorithm for Secure and Efficient Image Encryption. [PDF]
Abdelaal MA+5 more
europepmc +1 more source
A verifiably secure and robust authentication protocol for synergistically-assisted IoD deployment drones. [PDF]
Algarni AD, Innab N, Algarni F.
europepmc +1 more source
Transparent and Privacy-Preserving Mobile Crowd-Sensing System with Truth Discovery. [PDF]
Jia R, Ma J, You Z, Zhang M.
europepmc +1 more source
Algorithm for Key Transparency with Transparent Logs. [PDF]
Mollakuqe E+4 more
europepmc +1 more source
Security Properties of Domain Extenders for Cryptographic Hash Functions [PDF]
Elena Andreeva+2 more
openalex +1 more source
Secure gray image sharing framework with adaptive key generation using image digest. [PDF]
Nithya C+7 more
europepmc +1 more source