Privacy-preserving and verifiable spectral graph analysis in the cloud. [PDF]
Song Y.
europepmc +1 more source
A cross-chain model for warehouse receipts in port supply chain based on notary mechanism and ShangMi cryptographic algorithms. [PDF]
Chen Y+5 more
europepmc +1 more source
Conic curve encryption and digital signature based on complex number theory for cybersecurity applications. [PDF]
Kamal A+3 more
europepmc +1 more source
CrustChain: Resolving the blockchain trilemma via decentralized storage and proof-of-capacity consensus. [PDF]
Reno S, Roy K.
europepmc +1 more source
Research on Development Progress and Test Evaluation of Post-Quantum Cryptography. [PDF]
Zhang M+6 more
europepmc +1 more source
High accuracy indoor positioning system using Galois field-based cryptography and hybrid deep learning. [PDF]
Hazzazi MM+5 more
europepmc +1 more source
A hybrid security protocol based on honey encryption and hyperchaotic systems for improving security in internet of things. [PDF]
Wang W, Liu C, Zhu W, Xie C.
europepmc +1 more source
Genomic privacy and security in the era of artificial intelligence and quantum computing. [PDF]
Annan R+5 more
europepmc +1 more source
Triple-layered security system: reliable and secured image communications over 5G and beyond networks. [PDF]
Srour T+3 more
europepmc +1 more source