Results 131 to 140 of about 80,704 (203)
A secure and efficient encryption system based on adaptive and machine learning for securing data in fog computing. [PDF]
Kumar PR, Goel S.
europepmc +1 more source
A critical analysis of deployed use cases for quantum key distribution and comparison with post-quantum cryptography. [PDF]
Aquina N+9 more
europepmc +1 more source
Asymmetric Public Key Cryptography by Using Logic-based Optical Processing
Sang Keun Gil
openalex +2 more sources
Post-Quantum Linkable Hash-Based Ring Signature Scheme for Off-Chain Payments in IoT. [PDF]
He L, Zhou X, Cai D, Hu X, Liu S.
europepmc +1 more source
Quantum secure direct communication: whispering with photons. [PDF]
Wang M, Long GL.
europepmc +1 more source
Securing face images in UAV networks using chaos and DNA cryptography approach. [PDF]
Inam S+4 more
europepmc +1 more source
Length-Weight Distribution of Non-Zero Elements in Randomized Bit Sequences. [PDF]
Lange C+3 more
europepmc +1 more source