Provably lightweight and secure IoHT scheme with post-quantum cryptography and fog computing: A comprehensive scheme for healthcare system. [PDF]
Abood EW +4 more
europepmc +1 more source
This study shows that a local, data‐driven AI model can accurately predict diverse optical and chiroptical properties of [6]helicenes using information from close structural neighbours. Combined with genetic algorithms, it enables inverse design for tailored properties, establishing practical structure–property rules for efficient molecular discovery ...
Rafael G. Uceda +8 more
wiley +1 more source
A Lightweight Authentication and Key Distribution Protocol for XR Glasses Using PUF and Cloud-Assisted ECC. [PDF]
Cha W, Lee HJ, Kook S, Kim K, Won D.
europepmc +1 more source
CryptoShield-multilayered cryptographic framework for enhanced security and robust communication systems. [PDF]
Altaf M +4 more
europepmc +1 more source
Identity-Based Efficient Secure Data Communication Protocol for Hierarchical Sensor Groups in Smart Grid. [PDF]
Feng Y, Sun Y, Cao Y, Xu B, Li Y.
europepmc +1 more source
An improved hybrid image steganography method using AES algorithm. [PDF]
Banoori SZ +9 more
europepmc +1 more source
Secure data transmission through fractal-based cryptosystem: a Noor iteration approach. [PDF]
Negi D, Kumar R, Kumar V, Dhaka A.
europepmc +1 more source
Searchable symmetric encryption: Improved definitions and efficient constructions [PDF]
Searchable symmetric encryption (SSE) allows a party to outsource the storage of his data to another party in a private manner, while maintaining the ability to selectively search over it. This problem has been the focus of active research and several security definitions and constructions have been proposed.
Reza Curtmola +3 more
openaire +1 more source
Related searches:
Deniable Searchable Symmetric Encryption
Information Sciences, 2017zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Li, Huige, Zhang, Fangguo, Fan, Chun-I
openaire +2 more sources

