Vehicle-to-Vehicle Secure Communication Protocol Based on Digital Vehicle Identification Number. [PDF]
Escapa Gordón P +2 more
europepmc +1 more source
Generalized triangle group based S-box construction for secure image encryption. [PDF]
Abbasi AZ +5 more
europepmc +1 more source
A combinatory approach of non-chain ring and henon map for image encryption application. [PDF]
Mohi Ud Din S +4 more
europepmc +1 more source
"In Mathematical Language": On Mathematical Foundations of Quantum Foundations. [PDF]
Plotnitsky A.
europepmc +1 more source
Extracting automata from neural networks using active learning. [PDF]
Xu Z, Wen C, Qin S, He M.
europepmc +1 more source
Applying the defense model to strengthen information security with artificial intelligence in computer networks of the financial services sector. [PDF]
Karn AL +7 more
europepmc +1 more source
Canonicalizing Zeta Generators: Genus Zero and Genus One. [PDF]
Dorigoni D +7 more
europepmc +1 more source
Most totally real fields do not have universal forms or the Northcott property. [PDF]
Daans N +4 more
europepmc +1 more source
CryptoShield-multilayered cryptographic framework for enhanced security and robust communication systems. [PDF]
Altaf M +4 more
europepmc +1 more source
On <i>p</i>-refined Friedberg-Jacquet integrals and the classical symplectic locus in the GL 2 n eigenvariety. [PDF]
Barrera Salazar D, Graham A, Williams C.
europepmc +1 more source

