Results 301 to 310 of about 93,492 (364)
Secure data transmission through fractal-based cryptosystem: a Noor iteration approach. [PDF]
Negi D, Kumar R, Kumar V, Dhaka A.
europepmc +1 more source
Multi-Party Verifiably Collaborative Encryption for Biomedical Signals via Singular Spectrum Analysis-Based Chaotic Filter Bank Networks. [PDF]
Zhang X, He J, Ling BW.
europepmc +1 more source
Compelled Decryption & State Constitutional Protection Against Self-Incrimination
David Rangaviz
openalex +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
IEEE Transactions on Automatic Control, 2023
This article is concerned with the secure state estimation problem for a networked system with multirate measurements. The measurement data are transmitted to the estimator over a communication network, where an eavesdropper could intercept the ...
Lei Zou +3 more
semanticscholar +1 more source
This article is concerned with the secure state estimation problem for a networked system with multirate measurements. The measurement data are transmitted to the estimator over a communication network, where an eavesdropper could intercept the ...
Lei Zou +3 more
semanticscholar +1 more source
ACS Nano, 2023
The low formation energies of metal halide perovskites endow them with potential luminescent materials for applications in information encryption and decryption.
Linxiang Zeng +9 more
semanticscholar +1 more source
The low formation energies of metal halide perovskites endow them with potential luminescent materials for applications in information encryption and decryption.
Linxiang Zeng +9 more
semanticscholar +1 more source
Fault-Tolerant Consensus Control for Multiagent Systems: An Encryption-Decryption Scheme
IEEE Transactions on Automatic Control, 2021In this article, the fault-tolerant consensus control problem is investigated for multiagent systems with sensor faults. A first-order difference equation is utilized to describe the sensor fault, and an observer is designed to estimate the state and the
Chen Gao +3 more
semanticscholar +1 more source
Small, 2022
The growing urgence of information protection promotes continuously the development of information-encryption technique. To date, hydrogels have become an emerging candidate for advanced information-encryption materials, because of their unique stimulus ...
Xinyi Lan +8 more
semanticscholar +1 more source
The growing urgence of information protection promotes continuously the development of information-encryption technique. To date, hydrogels have become an emerging candidate for advanced information-encryption materials, because of their unique stimulus ...
Xinyi Lan +8 more
semanticscholar +1 more source
Attribute-Based Encryption With Parallel Outsourced Decryption for Edge Intelligent IoV
IEEE Transactions on Vehicular Technology, 2020Edge intelligence is an emerging concept referring to processes in which data are collected and analyzed and insights are delivered close to where the data are captured in a network using a selection of advanced intelligent technologies.
Chaosheng Feng +5 more
semanticscholar +1 more source

