Design of highly nonlinear confusion component based on entangled points of quantum spin states. [PDF]
Muhammad Waseem H, Hwang SO.
europepmc +1 more source
A custom hash algorithm for hosting secure gray scale image repository in public cloud. [PDF]
Murugesan V +2 more
europepmc +1 more source
Verifiable, Secure Mobile Agent Migration in Healthcare Systems Using a Polynomial-Based Threshold Secret Sharing Scheme with a Blowfish Algorithm. [PDF]
Kumar P +6 more
europepmc +1 more source
BRISK: Dynamic Encryption Based Cipher for Long Term Security. [PDF]
Dwivedi AD.
europepmc +1 more source
Decentralized energy optimization using blockchain with battery storage and electric vehicle networks. [PDF]
Chinnaperumal S +7 more
europepmc +1 more source
IAESR: IoT-oriented authenticated encryption based on iShadow round function. [PDF]
Zhang Y +5 more
europepmc +1 more source
Light weight encryption technique: a cellular automaton based approach for securing health records. [PDF]
Anwar S, Pranav P, Kamilya S.
europepmc +1 more source
dmrt2 and myf5 Link Early Somitogenesis to Left-Right Axis Determination in Xenopus laevis. [PDF]
Tingler M +3 more
europepmc +1 more source
Exploring security threats and solutions Techniques for Internet of Things (IoT): from vulnerabilities to vigilance. [PDF]
Sahu SK, Mazumdar K.
europepmc +1 more source
Enhanced related-key differential neural distinguishers for SIMON and SIMECK block ciphers. [PDF]
Wang G, Wang G.
europepmc +1 more source

