Results 131 to 140 of about 2,808 (186)

Designing Two Secure Keyed Hash Functions Based on Sponge Construction and the Chaotic Neural Network. [PDF]

open access: yesEntropy (Basel), 2020
Abdoun N   +5 more
europepmc   +1 more source

Blockchain-Modeled Edge-Computing-Based Smart Home Monitoring System with Energy Usage Prediction. [PDF]

open access: yesSensors (Basel), 2023
Iqbal F   +6 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy