Robust Access Control for Secure IoT Outsourcing with Leakage Resilience. [PDF]
Riad K.
europepmc +1 more source
Provably secure and lightweight blockchain based cross hospital authentication scheme for IoMT-based healthcare. [PDF]
Xie Q, Ding Z.
europepmc +1 more source
Computational challenges and solutions: Prime number generation for enhanced data security. [PDF]
Ezz-Eldien A+6 more
europepmc +1 more source
Predictions for 2025: Artificial Intelligence in Modern Drug Development, Quantum-Proof Encryption, and Health Data Monetization. [PDF]
Vasiliu-Feltes I, Hinkel J, Kubassova O.
europepmc +1 more source
A novel method for generating public keys involving matrix operations. [PDF]
Sun X, Han J, Lv B, Sun C, Zeng C.
europepmc +1 more source
A survey on advancements in blockchain-enabled spectrum access security for 6G cognitive radio IoT networks. [PDF]
Al-Matari NY+2 more
europepmc +1 more source
Forward and Backward Private Searchable Encryption for Cloud-Assisted Industrial IoT. [PDF]
Peng T+7 more
europepmc +1 more source
Equational Cryptographic Reasoning in the Maude-NRL Protocol Analyzer
Santiago Escobar+2 more
openalex +1 more source
Ethernet Passive Mutual Authentication Scheme on Quantum Networks. [PDF]
Tian J, Qin P, Zhao Z, Qin B.
europepmc +1 more source
Abstractions for verification of security properties of cryptographic protocols
Alexandre Boisseau
openalex +1 more source