Found: 23
Select item for more details and to access through your institution.
Robust palmprint identification based on directional representations and compressed sensing.
- Published in:
- Multimedia Tools & Applications, 2014, v. 70, n. 3, p. 2331, doi. 10.1007/s11042-012-1240-8
- By:
- Publication type:
- Article
A Blockchain-Based Privacy-Preserving Healthcare Data Sharing Scheme for Incremental Updates.
- Published in:
- Symmetry (20738994), 2024, v. 16, n. 1, p. 89, doi. 10.3390/sym16010089
- By:
- Publication type:
- Article
A Malware Detection Approach Based on Deep Learning and Memory Forensics.
- Published in:
- Symmetry (20738994), 2023, v. 15, n. 3, p. 758, doi. 10.3390/sym15030758
- By:
- Publication type:
- Article
An Approach for Blockchain and Symmetric Keys Broadcast Encryption Based Access Control in IoT.
- Published in:
- Symmetry (20738994), 2023, v. 15, n. 2, p. 299, doi. 10.3390/sym15020299
- By:
- Publication type:
- Article
Security Enhanced Symmetric Key Encryption Employing an Integer Code for the Erasure Channel.
- Published in:
- Symmetry (20738994), 2022, v. 14, n. 8, p. 1709, doi. 10.3390/sym14081709
- By:
- Publication type:
- Article
An Approach for Blockchain Pool Mining Employing the Consensus Protocol Robust against Block Withholding and Selfish Mining Attacks.
- Published in:
- Symmetry (20738994), 2022, v. 14, n. 8, p. 1711, doi. 10.3390/sym14081711
- By:
- Publication type:
- Article
An adaptive approach for Linux memory analysis based on kernel code reconstruction.
- Published in:
- EURASIP Journal on Information Security, 2016, v. 2016, n. 1, p. 1, doi. 10.1186/s13635-016-0038-z
- By:
- Publication type:
- Article
Correction: Wang, L.; Guan, C. Improving Security in the Internet of Vehicles: A Blockchain-Based Data Sharing Scheme. Electronics 2024, 13 , 714.
- Published in:
- 2024
- By:
- Publication type:
- Correction Notice
Improving Security in the Internet of Vehicles: A Blockchain-Based Data Sharing Scheme.
- Published in:
- Electronics (2079-9292), 2024, v. 13, n. 4, p. 714, doi. 10.3390/electronics13040714
- By:
- Publication type:
- Article
Cross-Chain Asset Transaction Method Based on Ring Signature for Identity Privacy Protection.
- Published in:
- Electronics (2079-9292), 2023, v. 12, n. 24, p. 5010, doi. 10.3390/electronics12245010
- By:
- Publication type:
- Article
Secure Virtualization Environment Based on Advanced Memory Introspection.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/9410278
- By:
- Publication type:
- Article
HETEROGENEOUS MULTISCALE METHOD FOR OPTIMAL CONTROL PROBLEM GOVERNED BY ELLIPTIC EQUATIONS WITH HIGHLY OSCILLATORY COEFFICIENTS.
- Published in:
- Journal of Computational Mathematics, 2018, v. 36, n. 5, p. 644, doi. 10.4208/jcm.1703-m2015-0433
- By:
- Publication type:
- Article
Immunization of Epidemics in Multiplex Networks.
- Published in:
- PLoS ONE, 2014, v. 9, n. 11, p. 1, doi. 10.1371/journal.pone.0112018
- By:
- Publication type:
- Article
Privacy protection in social applications: A ciphertext policy attribute‐based encryption with keyword search.
- Published in:
- International Journal of Intelligent Systems, 2022, v. 37, n. 12, p. 12152, doi. 10.1002/int.23080
- By:
- Publication type:
- Article
IsoqurPEKS: An Isogeny-Based Quantum-Resistant Public-Key Encryption Scheme with Keyword Search.
- Published in:
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/8453228
- By:
- Publication type:
- Article
A User-Centered Medical Data Sharing Scheme for Privacy-Preserving Machine Learning.
- Published in:
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/3670107
- By:
- Publication type:
- Article
A Multiuser Ciphertext Search Scheme Based on Blockchain and SGX.
- Published in:
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/9062615
- By:
- Publication type:
- Article
Ethereum Ponzi Scheme Detection Based on PD-SECR.
- Published in:
- Security & Communication Networks, 2022, v. 2022, p. 1, doi. 10.1155/2022/2316310
- By:
- Publication type:
- Article
A Blockchain-Based User Authentication Scheme with Access Control for Telehealth Systems.
- Published in:
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/6735003
- By:
- Publication type:
- Article
A Sharding Scheme Based on Graph Partitioning Algorithm for Public Blockchain.
- Published in:
- CMES-Computer Modeling in Engineering & Sciences, 2024, v. 139, n. 3, p. 3311, doi. 10.32604/cmes.2023.046164
- By:
- Publication type:
- Article
The Applications of Blockchain in Artificial Intelligence.
- Published in:
- Security & Communication Networks, 2021, p. 1, doi. 10.1155/2021/6126247
- By:
- Publication type:
- Article
A Blockchain System Based on Quantum-Resistant Digital Signature.
- Published in:
- Security & Communication Networks, 2021, p. 1, doi. 10.1155/2021/6671648
- By:
- Publication type:
- Article
An Approach for Security Enhancement of Certain Encryption Schemes Employing Error Correction Coding and Simulated Synchronization Errors.
- Published in:
- Entropy, 2022, v. 24, n. 3, p. 406, doi. 10.3390/e24030406
- By:
- Publication type:
- Article