Search alternatives:
method algorithm » network algorithm (Expand Search), means algorithm (Expand Search), mean algorithm (Expand Search)
based encryption » image encryption (Expand Search), data encryption (Expand Search)
elements method » element method (Expand Search)
code algorithm » cosine algorithm (Expand Search), novel algorithm (Expand Search), modbo algorithm (Expand Search)
data code » data model (Expand Search), data came (Expand Search)
method algorithm » network algorithm (Expand Search), means algorithm (Expand Search), mean algorithm (Expand Search)
based encryption » image encryption (Expand Search), data encryption (Expand Search)
elements method » element method (Expand Search)
code algorithm » cosine algorithm (Expand Search), novel algorithm (Expand Search), modbo algorithm (Expand Search)
data code » data model (Expand Search), data came (Expand Search)
-
21
-
22
-
23
-
24
-
25
-
26
-
27
-
28
-
29
Dual deconvolution algorithm: analysis code with experimental data
Published 2025“…<p dir="ltr">This software package provides key algorithms for dual-deconvolution microscopy analysis, along with both experimental and numerical data. …”
-
30
-
31
-
32
-
33
-
34
-
35
-
36
-
37
-
38
Threshold encryption flow.
Published 2025“…Through ciphertext fragment verification algorithms and Lagrange interpolation-based key reconstruction, the framework enables secure query decryption and service matching in untrusted third-party environments, guaranteeing information security, integrity, and non-repudiation. …”
-
39
pone.0314656.t002 - Privacy-preserving method for face recognition based on homomorphic encryption
Published 2025Subjects: -
40
pone.0314656.t001 - Privacy-preserving method for face recognition based on homomorphic encryption
Published 2025Subjects: