Results 131 to 140 of about 7,819 (154)
Fusion cryptography for secure medical data transmission using mathematical quantum computing operations. [PDF]
Aljaedi A +4 more
europepmc +1 more source
ChebIoD: a Chebyshev polynomial-based lightweight authentication scheme for internet of drones environments. [PDF]
Al-Mekhlafi ZG +9 more
europepmc +1 more source
Semantic decentralized authentication for IoT-based e-learning using Hedera Hashgraph and Knowledge Graphs. [PDF]
Luo L, Zhang Y, Tang Q.
europepmc +1 more source
A new algorithm for multiple medical image encryption based on stacked representation and block division. [PDF]
Alsahafi YS +3 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
The Arithmetic Optimization Algorithm
Computer Methods in Applied Mechanics and Engineering, 2021Laith Mohammad Abualigah +2 more
exaly
The Whale Optimization Algorithm
Advances in Engineering Software, 2016Seyedali Mirjalili, Andrew J Lewis
exaly

