Found: 4919
Select item for more details and to access through your institution.
Dynamically Securing the Data by <sup>1</sup>O<sub>2</sub> Sensitization of Fluorescent Composites with a High Latency and Uncrackable Features.
- Published in:
- Chinese Journal of Chemistry, 2024, v. 42, n. 14, p. 1651, doi. 10.1002/cjoc.202300773
- By:
- Publication type:
- Article
A Sustainable Data Encryption Storage and Processing Framework via Edge Computing-Driven IoT.
- Published in:
- Engineering Letters, 2024, v. 32, n. 7, p. 1510
- By:
- Publication type:
- Article
SECURE ENCRYPTED TRANSMISSION OF NETWORK DATA IN CLOUD COMPUTING TECHNOLOGY ENVIRONMENT.
- Published in:
- Scalable Computing: Practice & Experience, 2024, v. 25, n. 4, p. 2671, doi. 10.12694/scpe.v25i4.2980
- By:
- Publication type:
- Article
A FRAMEWORK OF DIGITAL TWINS FOR IMPROVING RESPIRATORY HEALTH AND HEALTHCARE MEASURES.
- Published in:
- Scalable Computing: Practice & Experience, 2024, v. 25, n. 4, p. 3214, doi. 10.12694/scpe.v25i4.2940
- By:
- Publication type:
- Article
BGNBA-OCO based privacy preserving attribute based access control with data duplication for secure storage in cloud.
- Published in:
- Journal of Cloud Computing (2192-113X), 2024, v. 13, n. 1, p. 1, doi. 10.1186/s13677-023-00544-1
- By:
- Publication type:
- Article
Achieving Seconds‐to‐Hours Duration‐Tunable Organic Long Persistent Luminescence from Carbon Dots‐Based Exciplex Systems by Energy Gaps Regulation<sup>†</sup>.
- Published in:
- Chinese Journal of Chemistry, 2024, v. 42, n. 12, p. 1407, doi. 10.1002/cjoc.202300795
- By:
- Publication type:
- Article
Exploring extreme multistability in cyclic symmetric conservative systems via two distinct methods.
- Published in:
- Nonlinear Dynamics, 2024, v. 112, n. 12, p. 10509, doi. 10.1007/s11071-024-09584-x
- By:
- Publication type:
- Article
Photochromic luminescence of organic crystals arising from subtle molecular rearrangement.
- Published in:
- Nature Communications, 2024, v. 15, n. 1, p. 1, doi. 10.1038/s41467-024-48728-w
- By:
- Publication type:
- Article
Modified Playfair for Text File Encryption and Meticulous Decryption with Arbitrary Fillers by Septenary Quadrate Pattern.
- Published in:
- International Journal of Networked & Distributed Computing, 2024, v. 12, n. 1, p. 108, doi. 10.1007/s44227-023-00019-4
- By:
- Publication type:
- Article
A Usable Encryption Solution for File-Based Geospatial Data within a Database File System.
- Published in:
- Journal of Cybersecurity & Privacy, 2024, v. 4, n. 2, p. 298, doi. 10.3390/jcp4020015
- By:
- Publication type:
- Article
Leveraging chaos for enhancing encryption and compression in large cloud data transfers.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 9, p. 11923, doi. 10.1007/s11227-024-05906-3
- By:
- Publication type:
- Article
Will sentiment analysis need subculture? A new data augmentation approach.
- Published in:
- Journal of the Association for Information Science & Technology, 2024, v. 75, n. 6, p. 655, doi. 10.1002/asi.24872
- By:
- Publication type:
- Article
Design of Secure and Privacy-Preserving Data Sharing Scheme Based on Key Aggregation and Private Set Intersection in Medical Information System.
- Published in:
- Mathematics (2227-7390), 2024, v. 12, n. 11, p. 1717, doi. 10.3390/math12111717
- By:
- Publication type:
- Article
GPOD: An Efficient and Secure Graphical Password Authentication System by Fast Object Detection.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 19, p. 56569, doi. 10.1007/s11042-023-17571-4
- By:
- Publication type:
- Article
Efficient intersystem crossing and tunable ultralong organic room-temperature phosphorescence via doping polyvinylpyrrolidone with polyaromatic hydrocarbons.
- Published in:
- Nature Communications, 2024, v. 15, n. 1, p. 1, doi. 10.1038/s41467-024-48913-x
- By:
- Publication type:
- Article
Medical Data in Wireless Body Area Networks: Device Authentication Techniques and Threat Mitigation Strategies Based on a Token-Based Communication Approach.
- Published in:
- Network (2673-8732), 2024, v. 4, n. 2, p. 133, doi. 10.3390/network4020007
- By:
- Publication type:
- Article
Secure and Scalable Internet of Things Model Using Post-Quantum MACsec.
- Published in:
- Applied Sciences (2076-3417), 2024, v. 14, n. 10, p. 4215, doi. 10.3390/app14104215
- By:
- Publication type:
- Article
Quantum circuit implementations of lightweight authenticated encryption ASCON.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 8, p. 11322, doi. 10.1007/s11227-023-05877-x
- By:
- Publication type:
- Article
Enhancing Security and Efficiency: A Fine-Grained Searchable Scheme for Encryption of Big Data in Cloud-Based Smart Grids.
- Published in:
- Mathematics (2227-7390), 2024, v. 12, n. 10, p. 1512, doi. 10.3390/math12101512
- By:
- Publication type:
- Article
A new self-embedding digital watermarking encryption scheme.
- Published in:
- Nonlinear Dynamics, 2024, v. 112, n. 10, p. 8637, doi. 10.1007/s11071-024-09521-y
- By:
- Publication type:
- Article
Retraction Note: Research on privacy and secure storage protection of personalized medical data based on hybrid encryption.
- Published in:
- 2024
- By:
- Publication type:
- Correction Notice
Event‐based privacy‐preserving security consensus of multi‐agent systems with encryption–decryption mechanism.
- Published in:
- International Journal of Robust & Nonlinear Control, 2024, v. 34, n. 7, p. 4787, doi. 10.1002/rnc.7232
- By:
- Publication type:
- Article
Lattice-Based Homomorphic Encryption For Privacy-Preserving Smart Meter Data Analytics.
- Published in:
- Computer Journal, 2024, v. 67, n. 5, p. 1687, doi. 10.1093/comjnl/bxad093
- By:
- Publication type:
- Article
Kth min Threshold Encryption for Privacy-preserving Data Evaluation.
- Published in:
- Computer Journal, 2024, v. 67, n. 5, p. 1941, doi. 10.1093/comjnl/bxad113
- By:
- Publication type:
- Article
Privacy-Preserving Confidential Reporting System With Designated Reporters.
- Published in:
- Computer Journal, 2024, v. 67, n. 5, p. 1951, doi. 10.1093/comjnl/bxad114
- By:
- Publication type:
- Article
The Convergence of Artificial Intelligence and Blockchain: The State of Play and the Road Ahead.
- Published in:
- Information (2078-2489), 2024, v. 15, n. 5, p. 268, doi. 10.3390/info15050268
- By:
- Publication type:
- Article
AN ADAPTIVE ELLIPTICAL CURVE CRYPTOGRAPHY-RIVEST-SHAMIR-ADLEMAN-BASED ENCRYPTION FOR IoT HEALTHCARE SECURITY MODEL WITH BLOCKCHAIN TECHNOLOGY.
- Published in:
- Journal of Mechanics in Medicine & Biology, 2024, v. 24, n. 4, p. 1, doi. 10.1142/S0219519423500689
- By:
- Publication type:
- Article
Multilevel Information Encryption Mediated by Reconfigurable Thermal Emission in Smart Bilayer Material.
- Published in:
- Laser & Photonics Reviews, 2024, v. 18, n. 5, p. 1, doi. 10.1002/lpor.202301106
- By:
- Publication type:
- Article
Modulation of Excimer Formation and Photoexcitation Behaviour through DNA‐Surfactant‐Dye Supramolecular Assembly.
- Published in:
- Macromolecular Materials & Engineering, 2024, v. 309, n. 5, p. 1, doi. 10.1002/mame.202300329
- By:
- Publication type:
- Article
Depth-Optimized Quantum Circuits for ASCON: AEAD and HASH †.
- Published in:
- Mathematics (2227-7390), 2024, v. 12, n. 9, p. 1337, doi. 10.3390/math12091337
- By:
- Publication type:
- Article
Emergence of Novel WEDEx-Kerberotic Cryptographic Framework to Strengthen the Cloud Data Security against Malicious Attacks.
- Published in:
- Symmetry (20738994), 2024, v. 16, n. 5, p. 605, doi. 10.3390/sym16050605
- By:
- Publication type:
- Article
A Blockchain-Based Privacy Preserving Intellectual Property Authentication Method.
- Published in:
- Symmetry (20738994), 2024, v. 16, n. 5, p. 622, doi. 10.3390/sym16050622
- By:
- Publication type:
- Article
Inference Analysis of Video Quality of Experience in Relation with Face Emotion, Video Advertisement, and ITU-T P.1203.
- Published in:
- Technologies (2227-7080), 2024, v. 12, n. 5, p. 62, doi. 10.3390/technologies12050062
- By:
- Publication type:
- Article
A sustainable certificateless authenticated searchable encryption with multi-trapdoor indistinguishability.
- Published in:
- Telecommunication Systems, 2024, v. 86, n. 1, p. 213, doi. 10.1007/s11235-024-01121-w
- By:
- Publication type:
- Article
Warring Against Encryption: Australia is Coming for Your Communications.
- Published in:
- International Policy Digest, 2024, p. 3
- By:
- Publication type:
- Article
Robust, Ultrafast and Reversible Photoswitching in Bulk Polymers Enabled by Octupolar Molecule Design.
- Published in:
- Angewandte Chemie, 2024, v. 136, n. 16, p. 1, doi. 10.1002/ange.202402349
- By:
- Publication type:
- Article
Research on Dynamic Searchable Encryption Method Based on Bloom Filter.
- Published in:
- Applied Sciences (2076-3417), 2024, v. 14, n. 8, p. 3379, doi. 10.3390/app14083379
- By:
- Publication type:
- Article
An Efficient Lightweight Authentication Scheme for Smart Meter.
- Published in:
- Mathematics (2227-7390), 2024, v. 12, n. 8, p. 1264, doi. 10.3390/math12081264
- By:
- Publication type:
- Article
Analysis of Cryptographic Algorithms to Improve Cybersecurity in the Industrial Electrical Sector.
- Published in:
- Applied Sciences (2076-3417), 2024, v. 14, n. 7, p. 2964, doi. 10.3390/app14072964
- By:
- Publication type:
- Article
Warring Against Encryption: Australia is Coming for Your Communications.
- Published in:
- CounterPunch, 2024, p. 1
- By:
- Publication type:
- Article
Advancing User Privacy in Virtual Power Plants: A Novel Zero-Knowledge Proof-Based Distributed Attribute Encryption Approach.
- Published in:
- Electronics (2079-9292), 2024, v. 13, n. 7, p. 1283, doi. 10.3390/electronics13071283
- By:
- Publication type:
- Article
Digital Forensics Readiness Framework (DFRF) to Secure Database Systems.
- Published in:
- Engineering, Technology & Applied Science Research, 2024, v. 14, n. 2, p. 13732, doi. 10.48084/etasr.7116
- By:
- Publication type:
- Article
A Modified AES-512 Bits Algorithm for Data Encryption.
- Published in:
- European Journal of Pure & Applied Mathematics, 2024, v. 17, n. 2, p. 979, doi. 10.29020/nybg.ejpam.v17i2.5114
- By:
- Publication type:
- Article
Efficient Cybersecurity Assessment Using SVM and Fuzzy Evidential Reasoning for Resilient Infrastructure.
- Published in:
- Ingénierie des Systèmes d'Information, 2024, v. 29, n. 2, p. 515, doi. 10.18280/isi.290212
- By:
- Publication type:
- Article
Multi-Granularity Feature Fusion for Enhancing Encrypted Traffic Classification.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 4, p. 1090, doi. 10.14569/ijacsa.2024.01504110
- By:
- Publication type:
- Article
Integrating the edge computing paradigm into the development of IoT forensic methodologies.
- Published in:
- International Journal of Information Security, 2024, v. 23, n. 2, p. 1093, doi. 10.1007/s10207-023-00776-x
- By:
- Publication type:
- Article
A SaaS Concept-Based Shopping Center Fire Risk Assessment Model for the Safety Management Applications.
- Published in:
- International Journal of Reliability, Quality & Safety Engineering, 2024, v. 31, n. 2, p. 1, doi. 10.1142/S0218539323500365
- By:
- Publication type:
- Article
A Review on Searchable Encryption Functionality and the Evaluation of Homomorphic Encryption.
- Published in:
- International Journal of Science, Technology & Society / Revista Internacional de CiÊncias, Tecnologia & Sociedade, 2024, v. 12, n. 2, p. 81, doi. 10.11648/j.ijsts.20241202.11
- By:
- Publication type:
- Article
A three-phase framework for secure storage and sharing of healthcare data based on blockchain, IPFS, proxy re-encryption and group communication.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 6, p. 7955, doi. 10.1007/s11227-023-05735-w
- By:
- Publication type:
- Article
Secure Data Delivery in a Software-Defined Wireless Body Area Network.
- Published in:
- Journal of Telecommunications & Information Technology, 2024, n. 2, p. 41, doi. 10.26636/jtit.2024.2.1491
- By:
- Publication type:
- Article