A network coding transmission strategy for preventing eavesdropping attacks. [PDF]
Pu B, Huang H, Pang G.
europepmc +1 more source
A method to enhance privacy preservation in cloud storage through a three-layer scheme for computational intelligence in fog computing. [PDF]
Ojha S +6 more
europepmc +1 more source
Landauer's Principle as a Special Case of Galois Connection. [PDF]
Kycia RA.
europepmc +1 more source
Structured Dynamics in the Algorithmic Agent. [PDF]
Ruffini G, Castaldo F, Vohryzek J.
europepmc +1 more source
From Tooth Adhesion to Bioadhesion: Development of Bioabsorbable Putty-like Artificial Bone with Adhesive to Bone Based on the New Material "Phosphorylated Pullulan". [PDF]
Nakanishi K +7 more
europepmc +1 more source
Area-Time-Efficient Secure Comb Scalar Multiplication Architecture Based on Recoding. [PDF]
Zhang Z +6 more
europepmc +1 more source
LWLCM: A novel lightweight stream cipher using logistic chaos function and multiplexer for IoT communications. [PDF]
Afzal S +5 more
europepmc +1 more source
A critical analysis of deployed use cases for quantum key distribution and comparison with post-quantum cryptography. [PDF]
Aquina N +9 more
europepmc +1 more source
Restless reachability problems in temporal graphs. [PDF]
Thejaswi S, Lauri J, Gionis A.
europepmc +1 more source
Enhancing medical image privacy in IoT with bit-plane level encryption using chaotic map. [PDF]
Asiri F +6 more
europepmc +1 more source

