Results 241 to 250 of about 230,478 (367)
A cross-chain model for warehouse receipts in port supply chain based on notary mechanism and ShangMi cryptographic algorithms. [PDF]
Chen Y+5 more
europepmc +1 more source
Attribute encryption access control method of high dimensional medical data based on fuzzy algorithm. [PDF]
Huang Y, Teng T, Li Y, Zhang M.
europepmc +1 more source
Abstract Purpose Training deep learning dose prediction models for the latest cutting‐edge radiotherapy techniques, such as AI‐based nodal radiotherapy (AINRT) and Daily Adaptive AI‐based nodal radiotherapy (DA‐AINRT), is challenging due to limited data.
Hui‐Ju Wang+5 more
wiley +1 more source
Enhanced lightweight and compromised-resilient image encryption for resource constrained environments. [PDF]
Mehmood A+5 more
europepmc +1 more source
Improving security of a chaotic encryption approach
Shujun Li, Xuanqin Mou, Yuanlong Cai
openalex +2 more sources
Multi-recipient Public-Key Encryption with Shortened Ciphertext [PDF]
Kaoru Kurosawa
openalex +1 more source
Craig Gentry, A. Sahai, Brent Waters
semanticscholar +1 more source
Abstract Purpose To compare image quality and clinical utility of a T2‐weighted (T2W) 3‐dimensional (3D) fast spin echo (FSE) sequence using deep learning reconstruction (DLR) versus conventional reconstruction for rectal magnetic resonance imaging (MRI).
Dan Nguyen+11 more
wiley +1 more source
A Complementary Approach for Securing and Anti-Counterfeiting of Valuable Documents Based on Encryption of Computer-Generated Hologram. [PDF]
Ahmed ZE+6 more
europepmc +1 more source
Advanced Encryption Standard (AES) Ciphersuites for Transport Layer Security (TLS) [PDF]
Pete Chown
openalex +1 more source