Results 111 to 120 of about 4,920 (187)

Designing Two Secure Keyed Hash Functions Based on Sponge Construction and the Chaotic Neural Network. [PDF]

open access: yesEntropy (Basel), 2020
Abdoun N   +5 more
europepmc   +1 more source

Post-quantum distributed ledger technology: a systematic survey. [PDF]

open access: yesSci Rep, 2023
Parida NK   +4 more
europepmc   +1 more source

Resilient cybersecurity in smart grid ICS communication using BLAKE3-driven dynamic key rotation and intrusion detection. [PDF]

open access: yesSci Rep
Dokku NS   +5 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy