Cryptographic protocols on real hyperelliptic curves
Michael J. Jacobson+2 more
openalex +2 more sources
Proxy panels enable privacy-aware outsourcing of genotype imputation. [PDF]
Zhi D, Jiang X, Harmanci A.
europepmc +1 more source
Data stewardship and curation practices in AI-based genomics and automated microscopy image analysis for high-throughput screening studies: promoting robust and ethical AI applications. [PDF]
Taddese AA, Addis AC, Tam BT.
europepmc +1 more source
Developing a comprehensive BACnet attack dataset: A step towards improved cybersecurity in building automation systems. [PDF]
Moosavi SA, Asgari M, Kamel SR.
europepmc +1 more source
Enhancing IoT security in smart grids with quantum-resistant hybrid encryption. [PDF]
Xiong J, Shen L, Liu Y, Fang X.
europepmc +1 more source
Secure PUF-Based Authentication Systems. [PDF]
Tun NW, Mambo M.
europepmc +1 more source
Post-quantum healthcare: A roadmap for cybersecurity resilience in medical data. [PDF]
SaberiKamarposhti M+6 more
europepmc +1 more source
An efficient ECC and fuzzy verifier based user authentication protocol for IoT enabled WSNs. [PDF]
Sudhakar T, Praveen R, Natarajan V.
europepmc +1 more source
Mapping of Industrial IoT to IEC 62443 Standards. [PDF]
Cindrić I, Jurčević M, Hadjina T.
europepmc +1 more source