Enhanced security of affine ciphers using digraph transformation and a modified three pass protocol. [PDF]
Bete S +4 more
europepmc +1 more source
Counter‐Stigmatization in the Digital Age: The Case of the Sex Tech Award Incident
Abstract Scholars have shown considerable interest in how organizations manage stigma when powerful actors discredit them and their products. However, research has paid less attention to how organizations might deflect stigma back onto their stigmatizers.
Neva Bojovic +2 more
wiley +1 more source
Secure edge-guided adaptive image steganography using HED-based attention maps and CNN. [PDF]
Alrawashdeh R +4 more
europepmc +1 more source
On the Security of Cell-Free Massive MIMO Networks. [PDF]
Mohammed H +4 more
europepmc +1 more source
Efficient ring signature for cross-chain data sharing in blockchain-enabled cold-chain logistics system. [PDF]
Zhang Y, Tang Y, Li C, Zhang H, Ahmad H.
europepmc +1 more source
Content-Adaptive Reversible Data Hiding with Multi-Stage Prediction Schemes. [PDF]
Huang HC, Chang FC, Li HY.
europepmc +1 more source
A secure and imperceptible communication system for sharing co-ordinate data. [PDF]
Bidwe R +5 more
europepmc +1 more source
A location privacy protection method based on blockchain and threshold cryptography. [PDF]
Hu Z, Jin R, Quan H, Ni S, He P.
europepmc +1 more source
Toward Efficient Health Data Identification and Classification in IoMT-Based Systems. [PDF]
Alsadhan A, Alhogail A, Alsalamah HA.
europepmc +1 more source

