Conic curve encryption and digital signature based on complex number theory for cybersecurity applications. [PDF]
Kamal A +3 more
europepmc +1 more source
Quantum-resilient and adaptive multi-region data aggregation for IoMT using zero-knowledge proofs and edge intelligence. [PDF]
Othman SB, Kumar G.
europepmc +1 more source
A flexible and lightweight signcryption scheme for underwater wireless sensor networks. [PDF]
Shah S +8 more
europepmc +1 more source
Privacy-preserving computation scheme for the maximum and minimum values of the sums of keyword-corresponding values in cross-chain data exchange. [PDF]
Liu X +9 more
europepmc +1 more source
Revisiting Wireless Cyberattacks on Vehicles. [PDF]
Gesteira-Miñarro R +2 more
europepmc +1 more source
Secure IoV communications for smart fleet systems empowered with ASCON. [PDF]
A J B, Kaythry P.
europepmc +1 more source
A novel memristor-based hyperchaotic hybrid encryption system with DNA for image encryption on the Jetson TX2. [PDF]
Ulutas H.
europepmc +1 more source
An online tool based on the Internet of Things and intelligent blockchain technology for data privacy and security in rural and agricultural development. [PDF]
Vellimalaipattinam Thiruvenkatasamy K +3 more
europepmc +1 more source
Blended clustering energy efficient routing and PUF based authentication in IoT enabled smart agriculture systems. [PDF]
Chandrasekaran SK, Rajasekaran VA.
europepmc +1 more source
CrustChain: Resolving the blockchain trilemma via decentralized storage and proof-of-capacity consensus. [PDF]
Reno S, Roy K.
europepmc +1 more source

