Results 171 to 180 of about 24,925 (334)
ABSTRACT This study presents a strong framework for the detection and classification of Submerged Cultural Heritage Assets (SCHA) in shallow marine environments using the integration of multibeam echosounder and airborne LiDAR bathymetry with object‐based image analysis and fuzzy logic–based classification.
Łukasz Janowski +4 more
wiley +1 more source
A secure multi phase authentication protocol for cloud infrastructure using elliptic curve cryptography. [PDF]
Sivasankar R, Marikkannan M.
europepmc +1 more source
Abstract Lactic acid is a valuable organic compound with wide applications in the pharmaceutical, food, and biodegradable plastics industries. As Côte d’Ivoire seeks to strengthen its industrial capacity and promote sustainable practices, the development of efficient and environmentally benign methods for the recovery and purification of lactic acid ...
Asengo Gerardin Mabia +7 more
wiley +1 more source
Correction: Cellular automata based key distribution for lightweight hybrid image encryption with elliptic curve cryptography. [PDF]
Yogi B, Khan AK, Roy S.
europepmc +1 more source
An Advanced Encryption Standard Powered Mutual Authentication Protocol Based on Elliptic Curve Cryptography for RFID, Proven on WISP [PDF]
Alaauldin Ibrahim, Gökhan Dalkılıç
openalex +1 more source
Early evolutionary history of the seed
ABSTRACT The seed is an essential stage in the life history of gymnospermous and angiospermous plants, facilitating both their survival and dispersal. We reappraise knowledge of the evolutionary history of the gymnospermous seed, from its origin in the late Devonian through to the well‐known end‐Permian extinctions – an interval encompassing the ...
Richard M. Bateman +2 more
wiley +1 more source
Privacy-preserving communication in smart city transportation using elliptic curve cryptography. [PDF]
Mohammed ZK +7 more
europepmc +1 more source
A survey of hardware implementations of elliptic curve cryptographic systems
Elliptic Curve Cryptography (ECC) has gained much recognition over the last decades and has established itself among the well known public-key cryptography schemes, not least due its smaller key size and relatively lower computational effort compared to ...
Halak, Basel +2 more
core

