Applying the defense model to strengthen information security with artificial intelligence in computer networks of the financial services sector. [PDF]
Karn AL +7 more
europepmc +1 more source
Congruence modules in higher codimension and zeta lines in Galois cohomology. [PDF]
Iyengar SB +3 more
europepmc +1 more source
Vehicle-to-Vehicle Secure Communication Protocol Based on Digital Vehicle Identification Number. [PDF]
Escapa Gordón P +2 more
europepmc +1 more source
CryptoShield-multilayered cryptographic framework for enhanced security and robust communication systems. [PDF]
Altaf M +4 more
europepmc +1 more source
A Study of the Optimal Logic Combinations of RO-Based PUFs on FPGAs to Maximize Identifiability. [PDF]
Aparicio-Téllez R +4 more
europepmc +1 more source
On the Application of a Hybrid Incomplete Exponential Sum to Aperiodic Hamming Correlation of Some Frequency-Hopping Sequences. [PDF]
Li P, Han H.
europepmc +1 more source
Low latency FPGA implementation of twisted Edward curve cryptography hardware accelerator over prime field. [PDF]
Hossain MR +7 more
europepmc +1 more source
On Quasi-Cyclic Codes of Index 3. [PDF]
Abdukhalikov K, Shat RM.
europepmc +1 more source
Advanced Applications of Polymer Hydrogels in Electronics and Signal Processing. [PDF]
Suleimenov I +5 more
europepmc +1 more source

