Results 241 to 250 of about 28,128 (285)
Fast and Secure Multiparty Querying over Federated Graph Databases. [PDF]
Aljuaid N, Lisitsa A, Schewe S.
europepmc +1 more source
Letter to the Editor about 'Preoperative duration of type 2 diabetes mellitus and remission after Roux-en-Y gastric bypass: A single center long-term cohort study'. [PDF]
Zhu Y, Zhang Q, Chen Y, Gong Y.
europepmc +1 more source
Proxy panels enable privacy-aware outsourcing of genotype imputation. [PDF]
Zhi D, Jiang X, Harmanci A.
europepmc +1 more source
Deep hashing and attention mechanism-based image retrieval of osteosarcoma scans for diagnosis of bone cancer. [PDF]
Zeng T +10 more
europepmc +1 more source
ESHA-256_GBGO: a high-performance and optimized security framework for internet of medical thing. [PDF]
Murugan G, Chinnadurai M.
europepmc +1 more source
Using ASCON-Based Fuzzy Hashing for Efficient Malware Analysis
Noman Nasir Minhas, Maida Naveed
openalex +2 more sources
Enhancing IoT-based healthcare security with grey filter bayesian CNN and optimization algorithms. [PDF]
Kalaivani A +7 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Designs, Codes and Cryptography, 2005
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Safavi-Naini, R., Charnes, C.
openaire +1 more source
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Safavi-Naini, R., Charnes, C.
openaire +1 more source

