Presentation Attack Detection on Limited-Resource Devices Using Deep Neural Classifiers Trained on Consistent Spectrogram Fragments. [PDF]
Kubicki K, Kapusta P, Ślot K.
europepmc +1 more source
An improved finegrained ciphertext policy based temporary keyword search on encrypted data for secure cloud storage. [PDF]
Dabra M, Sharma S, Kumar S, Min H.
europepmc +1 more source
Introducing and Exploring the Extremist Cybercrime Database (ECCD). [PDF]
Holt TJ +4 more
europepmc +1 more source
Metadata-Private Resource Allocation in Edge Computing Withstands Semi-Malicious Edge Nodes. [PDF]
Zhang Z, Li J, Li Y, He Y.
europepmc +1 more source
Retrieval Integrity Verification and Multi-System Data Interoperability Mechanism of a Blockchain Oracle for Smart Healthcare with Internet of Things (IoT) Integration. [PDF]
Zhou Z +5 more
europepmc +1 more source
A New Secure Model for Data Protection over Cloud Computing. [PDF]
Sauber AM +4 more
europepmc +1 more source
Attribute encryption access control method of high dimensional medical data based on fuzzy algorithm. [PDF]
Huang Y, Teng T, Li Y, Zhang M.
europepmc +1 more source
Analysis of noise and bias errors in intelligence information systems. [PDF]
Labib A +4 more
europepmc +1 more source
A Review on Blockchain Applications in Operational Technology for Food and Agriculture Critical Infrastructure. [PDF]
Zheng C +9 more
europepmc +1 more source
An Improved ID-Based Data Storage Scheme for Fog-Enabled IoT Environments. [PDF]
Lin HY, Tsai TT, Ting PY, Chen CC.
europepmc +1 more source

