Search alternatives:
method algorithm » network algorithm (Expand Search), means algorithm (Expand Search), mean algorithm (Expand Search)
based encryption » image encryption (Expand Search), data encryption (Expand Search)
code algorithm » cosine algorithm (Expand Search), novel algorithm (Expand Search), modbo algorithm (Expand Search)
data code » data model (Expand Search), data came (Expand Search)
element » elements (Expand Search)
method algorithm » network algorithm (Expand Search), means algorithm (Expand Search), mean algorithm (Expand Search)
based encryption » image encryption (Expand Search), data encryption (Expand Search)
code algorithm » cosine algorithm (Expand Search), novel algorithm (Expand Search), modbo algorithm (Expand Search)
data code » data model (Expand Search), data came (Expand Search)
element » elements (Expand Search)
-
1
Optimization-Driven Steganographic System Based on Fused Maps and Blowfish Encryption
Published 2025Subjects: -
2
Access control pseudo-code.
Published 2025“…Consequently, a high-dimensional medical data attribute encryption access control method based on fuzzy algorithm is proposed. …”
-
3
-
4
Comparison of homomorphic encryption algorithms.
Published 2024“…To address these challenges, this paper proposes a federated learning-based intrusion detection algorithm (NIDS-FGPA) that utilizes gradient similarity model aggregation. …”
-
5
-
6
-
7
Encryption performance.
Published 2024“…We proposed a blockchain-based method for secure EHR management and integrated Ciphertext-Policy Attribute-Based Encryption (CP-ABE) for fine-grained access control. …”
-
8
-
9
-
10
G R code algorithm.
Published 2024“…The algorithm was developed and coded in Verilog and simulated using Modelsim. …”
-
11
-
12
-
13
-
14
-
15
-
16
-
17
-
18
-
19
-
20