Results 241 to 250 of about 16,729,036 (330)
Can AI developers avoid bias in public health applications? [PDF]
Harms RJ +4 more
europepmc +1 more source
A secure multi phase authentication protocol for cloud infrastructure using elliptic curve cryptography. [PDF]
Sivasankar R, Marikkannan M.
europepmc +1 more source
Balancing quality collaborative supervision and tripartite satisfaction in elderly healthcare public-private partnerships: an evolutionary game and simulation analysis. [PDF]
Yue X, Durrani SK, Li R.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
A provably secure certificateless public key encryption with keyword search
Zhongguó gongchéng xuékan, 2019Public key encryption with keyword search, known as PEKS, is a useful technology in some Storage-as-a-Service clouds. This technology allows the cloud server to search on a keyword, which is received from the data owner/user, over encrypted data without ...
Tsu-Yang Wu +4 more
semanticscholar +1 more source
Request for Comments, 2019
This document describes a scheme for hybrid public-key encryption (HPKE). This scheme provides authenticated public key encryption of arbitrary-sized plaintexts for a recipient public key. HPKE works for any combination of an asymmetric key encapsulation
Richard L. Barnes +3 more
semanticscholar +1 more source
This document describes a scheme for hybrid public-key encryption (HPKE). This scheme provides authenticated public key encryption of arbitrary-sized plaintexts for a recipient public key. HPKE works for any combination of an asymmetric key encapsulation
Richard L. Barnes +3 more
semanticscholar +1 more source

