Results 101 to 110 of about 34,780 (224)

Genomic privacy and security in the era of artificial intelligence and quantum computing. [PDF]

open access: yesDiscov Comput
Annan R   +5 more
europepmc   +1 more source

A flexible and lightweight signcryption scheme for underwater wireless sensor networks. [PDF]

open access: yesSci Rep
Shah S   +8 more
europepmc   +1 more source

Integration of OWL Password-Authenticated Key Exchange Protocol to Enhance IoT Application Protocols. [PDF]

open access: yesSensors (Basel)
Julio YR   +4 more
europepmc   +1 more source

Enhancing security in IIoT: RFID authentication protocol for edge computing and blockchain-enabled supply chain

open access: yesCyber Security and Applications
This paper addresses security challenges, especially in the authentication mechanism of Industrial Internet of Things (IIoT)-enabled supply chain systems by proposing an enhanced Radio Frequency Identification (RFID) authentication protocol.
Vikash Kumar, Santosh Kumar Das
doaj  

Integrity verified lightweight ciphering for secure medical image sharing between embedded SoCs. [PDF]

open access: yesSci Rep
Janakiraman S   +5 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy