Results 221 to 230 of about 617,080 (246)
Secure electronic health record access control via blockchain, dual-attribute encryption, and large language model-based attribute extraction. [PDF]
Nekouie A +3 more
europepmc +1 more source
A compact public key encryption with equality test for lattice in cloud computing. [PDF]
He J, Ye Q, Yang Z, Wang S, Wang J.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
A Survey on Perfectly Secure Verifiable Secret-sharing
ACM Computing Surveys, 2022Ashish Choudhury, Arpita Patra
exaly
Boosting image watermarking authenticity spreading secrecy from counting‐based secret‐sharing
CAAI Transactions on Intelligence Technology, 2023Adnan Gutub
exaly
Network-Based Secret Communication in Clouds: A Survey
IEEE Communications Surveys and Tutorials, 2017Tanja Zseby, Edgar Weippl
exaly

