Searchable Deterministic Encryption against the Keyword Guessing Attack by Outside Attacker
Zhiyuan Liu, Liu zhenghua
openalex +1 more source
Quantizing DNA Metallization for Site‐Defined Growth of Single Quantum Emitters
Predictive design rules guide DNA origami‐templated synthesis of atomically precise silver nanoclusters. Controlled nucleation yields single emitters with nanometer registration and reproducible fluorescence signatures, paving the way toward programable quantum photonic architectures and nanoscale device integration.
Swati Tanwar +6 more
wiley +1 more source
Design and analysis of a secure image encryption algorithm using proposed non-linear RN chaotic system and ECC/HKDF key derivation with authentication support. [PDF]
Zhiqiang H +5 more
europepmc +1 more source
Moral Entrepreneurs of the Mastodon Migration
Social media platforms are imbued with politics and values through an interplay of coded architectures, platform policies, economic models, and algorithmic curation, together shaping and shaped by the activities of users. This dynamic set of relations is most evident during moments of disruption, in which platform politics and values come under debate.
Sean Ward +3 more
wiley +1 more source
An Iterative quantum chaotic security method design for big data deployments using a multi-model framework for key generation, threat modelling, and anomaly-resilient validation. [PDF]
Kotangale A, Kumar MS.
europepmc +1 more source
Image adaptive encryption using EfficientNet B3 feature guided multi scroll chaotic map with modulo controlled pseudo parallel processing. [PDF]
Subathra S, Thanikaiselvan V.
europepmc +1 more source
Tokenization techniques for privacy-preserving healthcare data: tokenization nuts and bolts. [PDF]
Cook CV.
europepmc +1 more source
A secured cloud‐medical data sharing with A‐BRSA and Salp ‐Ant Lion Optimisation Algorithm
Abstract Sharing medical data among healthcare providers, researchers, and patients is crucial for efficient healthcare services. Cloud‐assisted smart healthcare (s‐healthcare) systems have made it easier to store EHRs effectively. However, the traditional encryption algorithms used to secure this data can be vulnerable to attacks if the encryption key
Adel Binbusayyis +7 more
wiley +1 more source
Omega deoxyribonucleic acid cryptography key-based authentication. [PDF]
Chuah CW, Tey J, Mohamad KM.
europepmc +1 more source
Robotic Cell Micromanipulation Skill Learning via Imitation‐Enhanced Reinforcement Learning
ABSTRACT Humans can learn complex and dexterous manipulation tasks by observing videos, imitating and exploring. Multiple end‐effectors manipulation of free micron‐sized deformable cells is one of the challenging tasks in robotic micromanipulation. We propose an imitation‐enhanced reinforcement learning method inspired by the human learning process ...
Youchao Zhang +6 more
wiley +1 more source

