Found: 256
Select item for more details and to access through your institution.
Security enhanced privacy-preserving data aggregation scheme for intelligent transportation system.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 10, p. 13754, doi. 10.1007/s11227-024-05995-0
- By:
- Publication type:
- Article
Authenticated key agreement for IoT network using HECC and CRT four co-primes.
- Published in:
- Peer-to-Peer Networking & Applications, 2024, v. 17, n. 4, p. 2397, doi. 10.1007/s12083-024-01699-7
- By:
- Publication type:
- Article
New q-analogues of Van Hamme's (F.2) supercongruence and of some related supercongruences.
- Published in:
- Mathematica Slovaca, 2024, v. 74, n. 3, p. 629, doi. 10.1515/ms-2024-0048
- By:
- Publication type:
- Article
An Encode-and CRT-Based Scalability Scheme for Optimizing Transmission in Blockchain.
- Published in:
- CMES-Computer Modeling in Engineering & Sciences, 2024, v. 139, n. 2, p. 1733, doi. 10.32604/cmes.2023.044558
- By:
- Publication type:
- Article
Novel compressed linear network coding vectors for multihop communication networks.
- Published in:
- Telecommunication Systems, 2024, v. 86, n. 1, p. 83, doi. 10.1007/s11235-024-01110-z
- By:
- Publication type:
- Article
An Efficient Lightweight Authentication Scheme for Smart Meter.
- Published in:
- Mathematics (2227-7390), 2024, v. 12, n. 8, p. 1264, doi. 10.3390/math12081264
- By:
- Publication type:
- Article
A lossless compression and encryption scheme for sequence images based on 2D-CTCCM, MDFSM and STP.
- Published in:
- Nonlinear Dynamics, 2024, v. 112, n. 8, p. 6715, doi. 10.1007/s11071-024-09354-9
- By:
- Publication type:
- Article
Cryptanalysis of Two Conditional Privacy Preserving Authentication Schemes for Vehicular Ad Hoc Networks.
- Published in:
- Cryptography (2410-387X), 2024, v. 8, n. 1, p. 4, doi. 10.3390/cryptography8010004
- By:
- Publication type:
- Article
A New q-Variation of the (C.2) Supercongruence of Van Hamme.
- Published in:
- Results in Mathematics / Resultate der Mathematik, 2024, v. 79, n. 2, p. 1, doi. 10.1007/s00025-023-02119-7
- By:
- Publication type:
- Article
An Efficient Multi-Party Secure Aggregation Method Based on Multi-Homomorphic Attributes.
- Published in:
- Electronics (2079-9292), 2024, v. 13, n. 4, p. 671, doi. 10.3390/electronics13040671
- By:
- Publication type:
- Article
Authenticable dynamic quantum multi-secret sharing based on the Chinese remainder theorem.
- Published in:
- Quantum Information Processing, 2024, v. 23, n. 2, p. 1, doi. 10.1007/s11128-023-04236-2
- By:
- Publication type:
- Article
Proving the (In)Security of CRT Based Key Management Schemes Under SAOA Model.
- Published in:
- Wireless Personal Communications, 2024, v. 134, n. 3, p. 1299, doi. 10.1007/s11277-024-10925-7
- By:
- Publication type:
- Article
Proposed Hybrid Cryptosystems Based on Modifications of Playfair Cipher and RSA Cryptosystem.
- Published in:
- Baghdad Science Journal, 2024, v. 21, n. 1, p. 151, doi. 10.21123/bsj.2023.8361
- By:
- Publication type:
- Article
Wideband spectrum sensing using step-sampling based on the multipath nyquist folding receiver.
- Published in:
- Defence Technology, 2024, v. 31, p. 523, doi. 10.1016/j.dt.2022.12.016
- By:
- Publication type:
- Article
A NOTE ON NOETHERIAN AND ARTINIAN HOOPS.
- Published in:
- Discussiones Mathematicae: General Algebra & Applications, 2024, v. 44, n. 1, p. 177, doi. 10.7151/dmgaa.1435
- By:
- Publication type:
- Article
An Information Theoretic Condition for Perfect Reconstruction.
- Published in:
- Entropy, 2024, v. 26, n. 1, p. 86, doi. 10.3390/e26010086
- By:
- Publication type:
- Article
A Hybridized Honey Encryption for Data Security using Residue Number System.
- Published in:
- International Journal of Information Security & Cybercrime, 2023, v. 12, n. 2, p. 9, doi. 10.19107/ijisc.2023.02.01
- By:
- Publication type:
- Article
Integrating Non-Positional Numbering Systems into E-Commerce Platforms: A Novel Approach to Enhance System Fault Tolerance.
- Published in:
- Journal of Theoretical & Applied Electronic Commerce Research, 2023, v. 18, n. 4, p. 2033, doi. 10.3390/jtaer18040102
- By:
- Publication type:
- Article
Study of a Redundant Residue Number System for Single Error Correction.
- Published in:
- Advances in Systems Science & Applications, 2023, v. 23, n. 4, p. 31
- By:
- Publication type:
- Article
Algorithm for Determining the Optimal Weights for the Akushsky Core Function with an Approximate Rank.
- Published in:
- Applied Sciences (2076-3417), 2023, v. 13, n. 18, p. 10495, doi. 10.3390/app131810495
- By:
- Publication type:
- Article
CONSTRUCTION OF A MODEL OF STEGANOGRAPHIC EMBEDDING OF THE UAV IDENTIFIER INTO ADS-B DATA.
- Published in:
- Eastern-European Journal of Enterprise Technologies, 2023, v. 125, n. 4, p. 6, doi. 10.15587/1729-4061.2023.288178
- By:
- Publication type:
- Article
Distributed Diagnoses Based on Constructing a Private Chain via a Public Network.
- Published in:
- Entropy, 2023, v. 25, n. 9, p. 1305, doi. 10.3390/e25091305
- By:
- Publication type:
- Article
Toward Performant and Energy-Efficient Network Queries: A Parallel and Stateless Approach.
- Published in:
- Wireless Communications & Mobile Computing, 2023, p. 1, doi. 10.1155/2023/6185758
- By:
- Publication type:
- Article
Cross-Platform UAV Swarm Key Management in Denied Environments.
- Published in:
- Applied Sciences (2076-3417), 2023, v. 13, n. 15, p. 8918, doi. 10.3390/app13158918
- By:
- Publication type:
- Article
LSKA-ID: A lightweight security and key agreement protocol based on an identity for vehicular communication.
- Published in:
- Telkomnika, 2023, v. 21, n. 4, p. 784, doi. 10.12928/TELKOMNIKA.v21i4.24388
- By:
- Publication type:
- Article
A Software Framework for Intelligent Security Measures Regarding Sensor Data in the Context of Ambient Assisted Technology.
- Published in:
- Sensors (14248220), 2023, v. 23, n. 14, p. 6564, doi. 10.3390/s23146564
- By:
- Publication type:
- Article
Multiple approaches to Convert RNS to Decimal Numbers.
- Published in:
- Journal of Qadisiyah Computer Science & Mathematics, 2023, v. 15, n. 3, p. 1, doi. 10.29304/jqcm.2023.15.3.1276
- By:
- Publication type:
- Article
An Anonymous Authentication Scheme Based on Chinese Residue Theorem in Wireless Body Area Networks.
- Published in:
- Mathematics (2227-7390), 2023, v. 11, n. 13, p. 2951, doi. 10.3390/math11132951
- By:
- Publication type:
- Article
Utilizing Trusted Lightweight Ciphers to Support Electronic-Commerce Transaction Cryptography.
- Published in:
- Applied Sciences (2076-3417), 2023, v. 13, n. 12, p. 7085, doi. 10.3390/app13127085
- By:
- Publication type:
- Article
Reversible data hiding based on histogram and prediction error for sharing secret data.
- Published in:
- Cybersecurity (2523-3246), 2023, v. 6, n. 1, p. 1, doi. 10.1186/s42400-023-00147-y
- By:
- Publication type:
- Article
Lower Bound on the Minimum Distance of Single-Generator Quasi-Twisted Codes.
- Published in:
- Mathematics (2227-7390), 2023, v. 11, n. 11, p. 2539, doi. 10.3390/math11112539
- By:
- Publication type:
- Article
Ultra-low power wearables.
- Published in:
- Personal & Ubiquitous Computing, 2023, v. 27, n. 3, p. 1257, doi. 10.1007/s00779-021-01657-7
- By:
- Publication type:
- Article
An optimised homomorphic CRT-RSA algorithm for secure and efficient communication.
- Published in:
- Personal & Ubiquitous Computing, 2023, v. 27, n. 3, p. 1405, doi. 10.1007/s00779-021-01607-3
- By:
- Publication type:
- Article
Residue to binary converter for the extended four moduli set {2<sup>k</sup>, 2<sup>n</sup>−1, 2<sup>n</sup>+1, 2<sup>n+1</sup>+1} for n odd.
- Published in:
- Sādhanā: Academy Proceedings in Engineering Sciences, 2023, v. 48, n. 2, p. 1, doi. 10.1007/s12046-023-02118-y
- By:
- Publication type:
- Article
Lossless Reversible Data Hiding in Encrypted Image for Multiple Data Hiders Based on Pixel Value Order and Secret Sharing.
- Published in:
- Sensors (14248220), 2023, v. 23, n. 10, p. 4865, doi. 10.3390/s23104865
- By:
- Publication type:
- Article
Single Secret Sharing Scheme Using Chinese Remainder Theorem, Modified Shamir's Scheme and XOR Operation.
- Published in:
- Wireless Personal Communications, 2023, v. 130, n. 2, p. 957, doi. 10.1007/s11277-023-10315-5
- By:
- Publication type:
- Article
CRT-Based Homomorphic Encryption over the Fraction.
- Published in:
- Security & Communication Networks, 2023, p. 1, doi. 10.1155/2023/3106927
- By:
- Publication type:
- Article
Non-existence of Positive Integer Solutions of the Diophantine Equation p<sup>x</sup> + (p + 2q)<sup>y</sup> = z², where p, q and p + 2q are Prime Numbers.
- Published in:
- European Journal of Pure & Applied Mathematics, 2023, v. 16, n. 2, p. 724, doi. 10.29020/nybg.ejpam.v16i2.4702
- By:
- Publication type:
- Article
Authenticable medical image-sharing scheme based on embedded small shadow QR code and blockchain framework.
- Published in:
- Multimedia Systems, 2023, v. 29, n. 2, p. 831, doi. 10.1007/s00530-022-00999-3
- By:
- Publication type:
- Article
一种快速生成大素数的方法.
- Published in:
- Journal of South China Normal University (Natural Science Edition) / Huanan Shifan Daxue Xuebao (Ziran Kexue Ban), 2023, v. 55, n. 2, p. 124, doi. 10.6054/j.jscnun.2023028
- By:
- Publication type:
- Article
동적 전술 네트워크 환경에서 자율 무인체계를 위한 상호인증 기법.
- Published in:
- Journal of the Korea Institute of Information & Communication Engineering, 2023, v. 27, n. 3, p. 405, doi. 10.6109/jkiice.2023.27.3.405
- By:
- Publication type:
- Article
Counting Clean Triangles.
- Published in:
- Mathematical Intelligencer, 2023, v. 45, n. 1, p. 9, doi. 10.1007/s00283-021-10159-6
- By:
- Publication type:
- Article
SEMDA: Secure and Efficient Multidimensional Data Aggregation in Smart Grid without a Trusted Third Party.
- Published in:
- Security & Communication Networks, 2023, p. 1, doi. 10.1155/2023/6693296
- By:
- Publication type:
- Article
Sensor Networks: Physical and Social Sensing in the IoT.
- Published in:
- Sensors (14248220), 2023, v. 23, n. 3, p. 1451, doi. 10.3390/s23031451
- By:
- Publication type:
- Article
A Secret Image Sharing Based on Logistic-Chebyshev Chaotic Map and Chinese Remainder Theorem.
- Published in:
- Computer Science Journal of Moldova, 2023, v. 31, n. 1, p. 86, doi. 10.56415/csjm.v31.05
- By:
- Publication type:
- Article
A Semi-Blind Neighbor Discovery Algorithm Based on the Chinese Remainder Theorem.
- Published in:
- International Journal of Simulation -- Systems, Science & Technology, 2023, v. 24, n. 1, p. 1, doi. 10.5013/IJSSST.a.24.01.01
- By:
- Publication type:
- Article
A New Social Multi-Secret Sharing Scheme using Birkhoff Interpolation and Chinese Remainder Theorem.
- Published in:
- ISeCure, 2023, v. 15, n. 1, p. 125, doi. 10.22042/isecure.2022.293948.689
- By:
- Publication type:
- Article
Multi-factor user authentication and key agreement scheme for wireless sensor networks using Chinese remainder theorem.
- Published in:
- Peer-to-Peer Networking & Applications, 2023, v. 16, n. 1, p. 260, doi. 10.1007/s12083-022-01391-8
- By:
- Publication type:
- Article
An Efficient CRT Based Algorithm for Frequency Determination from Undersampled Real Waveform.
- Published in:
- Sensors (14248220), 2023, v. 23, n. 1, p. 452, doi. 10.3390/s23010452
- By:
- Publication type:
- Article
基于车联网的隐私保护数据聚合研究综述.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2022, v. 39, n. 12, p. 3546, doi. 10.19734/j.issn.1001-3695.2022.03.0197
- By:
- Publication type:
- Article