The Untapped Potential of Ascon Hash Functions: Benchmarking, Hardware Profiling, and Application Insights for Secure IoT and Blockchain Systems. [PDF]
Gladis Kurian M, Chen Y.
europepmc +1 more source
Research on digital twin diagnosis model for the thermal-electric field of high-voltage switchgears. [PDF]
Ding F, Ma Y, Li X, Huang J, Kang J.
europepmc +1 more source
Open Heart Mitral Valve Replacement Using Transcatheter Heart Valves for Severe Mitral Annular Calcification-A Literature Review. [PDF]
D'Alonzo M +8 more
europepmc +1 more source
BlockIntelChain: a blockchain-based cyber threat intelligence sharing architecture. [PDF]
Tolah A.
europepmc +1 more source
A secured accreditation and equivalency certification using Merkle mountain range and transformer based deep learning model for the education ecosystem. [PDF]
Krishnan S, Rajendran S, Zakariah M.
europepmc +1 more source
Analysis of SD-WAN Architectures and Techniques for Efficient Traffic Control Under Transmission Constraints-Overview of Solutions. [PDF]
Dudczyk J, Sergiel M, Krygier J.
europepmc +1 more source
Mental health peer support relationship: a realist informed qualitative meta synthesis. [PDF]
Hackmann C +4 more
europepmc +1 more source
Related searches:
Secure deduplication on mobile devices
Proceedings of the 2011 Workshop on Open Source and Design of Communication, 2011An increased use of mobile devices such as smart phones, PDAs and tablet computers with capabilities of storing and processing is rapidly growing. It allows users to carry an increasing volume of data, the value of this information must be protected from loss, theft or any kind of accident which may occur with the devices, making the backup process a ...
Luis Marques, Carlos J. Costa
openaire +1 more source

