A custom hash algorithm for hosting secure gray scale image repository in public cloud. [PDF]
Murugesan V +2 more
europepmc +1 more source
Verifiable, Secure Mobile Agent Migration in Healthcare Systems Using a Polynomial-Based Threshold Secret Sharing Scheme with a Blowfish Algorithm. [PDF]
Kumar P +6 more
europepmc +1 more source
DynBlock: dynamic data encryption with Toffoli gate for IoT. [PDF]
Haq M +6 more
europepmc +1 more source
BRISK: Dynamic Encryption Based Cipher for Long Term Security. [PDF]
Dwivedi AD.
europepmc +1 more source
Decentralized energy optimization using blockchain with battery storage and electric vehicle networks. [PDF]
Chinnaperumal S +7 more
europepmc +1 more source
IAESR: IoT-oriented authenticated encryption based on iShadow round function. [PDF]
Zhang Y +5 more
europepmc +1 more source
dmrt2 and myf5 Link Early Somitogenesis to Left-Right Axis Determination in Xenopus laevis. [PDF]
Tingler M +3 more
europepmc +1 more source
Light weight encryption technique: a cellular automaton based approach for securing health records. [PDF]
Anwar S, Pranav P, Kamilya S.
europepmc +1 more source
Exploring security threats and solutions Techniques for Internet of Things (IoT): from vulnerabilities to vigilance. [PDF]
Sahu SK, Mazumdar K.
europepmc +1 more source
Peer-to-Peer User Identity Verification Time Optimization in IoT Blockchain Network. [PDF]
Kairaldeen AR +3 more
europepmc +1 more source

