Results 141 to 150 of about 20,660 (211)

Enhancing IIoT security through blockchain-enabled workload analysis in fog computing environments. [PDF]

open access: yesSci Rep
Samriya JK   +7 more
europepmc   +1 more source

A critical analysis of deployed use cases for quantum key distribution and comparison with post-quantum cryptography. [PDF]

open access: yesEPJ Quantum Technol
Aquina N   +9 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy