Constructing formal models of cryptographic protocols from Alice&Bob style specifications via LLM. [PDF]
Li Q, Han J, Yuan L, Li X, Wang X.
europepmc +1 more source
Computational challenges and solutions: Prime number generation for enhanced data security. [PDF]
Ezz-Eldien A+6 more
europepmc +1 more source
A novel method for generating public keys involving matrix operations. [PDF]
Sun X, Han J, Lv B, Sun C, Zeng C.
europepmc +1 more source
A survey on advancements in blockchain-enabled spectrum access security for 6G cognitive radio IoT networks. [PDF]
Al-Matari NY+2 more
europepmc +1 more source
EAIA: An Efficient and Anonymous Identity-Authentication Scheme in 5G-V2V. [PDF]
Du Q, Zhou J, Ma M.
europepmc +1 more source
My Holistic Data Share: A WEB3 Data Share Application: Extending Beyond Finance to Privacy-Protected Decentralised Share of Multi-Dimensional Data to Enhance Global Healthcare. [PDF]
Krishnasamy S.
europepmc +1 more source
A Secure Data Sharing Model Utilizing Attribute-Based Signcryption in Blockchain Technology. [PDF]
Song C, Chen L, Wu X, Li Y.
europepmc +1 more source
PIA-A secure and efficient identity authentication scheme in telemedicine via the PUF method. [PDF]
Wang X+5 more
europepmc +1 more source
A dynamic authorizable ciphertext image retrieval algorithm based on security neural network inference. [PDF]
Zhang XY, Hong JW.
europepmc +1 more source