Results 271 to 280 of about 1,155,184 (293)
A cross-chain model for warehouse receipts in port supply chain based on notary mechanism and ShangMi cryptographic algorithms. [PDF]
Chen Y+5 more
europepmc +1 more source
Social media impact on societal security. [PDF]
Alnaqbi HH, Ali EAM.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Security and Privacy for 6G: A Survey on Prospective Technologies and Challenges
IEEE Communications Surveys and Tutorials, 2021Bo-chao Cheng+2 more
exaly
A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security
IEEE Communications Surveys and Tutorials, 2020Abdulla Al-ali, Amr Mohamed, Ihsan Ali
exaly
A Survey on Space-Air-Ground-Sea Integrated Network Security in 6G
IEEE Communications Surveys and Tutorials, 2022Hongzhi Guo, Jingyi Li, Jiajia Liu
exaly
Machine Learning in IoT Security: Current Solutions and Future Challenges
IEEE Communications Surveys and Tutorials, 2020Ekram Hossain+2 more
exaly
A Survey on Metaverse: Fundamentals, Security, and Privacy
IEEE Communications Surveys and Tutorials, 2023Yuntao Wang, Zhou Su, Xiaofeng Tao
exaly