ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Education
Sports
Technology
Computing
Religion
Research
Economy
Social Sciences
Architecture and Urbanism
Public health
all records (73)

Languages
English
Spanish
Portuguese
German

Countries
Indonesia
USA
South Africa
Poland
Brazil
Ukraine
Italy
Cuba
Canada
Austria
all records (70)

Years
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
all records (24)

Filter  
 
211.987  Articles
1 of 21.200 pages  |  10  records  |  more records»
Data protection is representing a huge trade in the modern era; the vast communication development gave this field increased attention from all sorts of parties (friends and foes); integral transforms have played a decent role in many methods that are pro... see more

Cloud computing is an Internet-based computing. In cloud computing, the service is fully served by the provider. Users need nothing but personal devices and Internet access. Computing services, such as data, storage, software, computing, and application, ... see more

Blockchain technology provides several suitable characteristics such as immutability, decentralization and verifiable ledger. It records the transactions in a decentralized way and can be integrated into several fields like eHealth, e-Government and smart... see more

International data encryption algorithm (IDEA) is a secret key or symmetric key block cipher. The purpose of IDEA was to replace data encryption standard (DES) cipher, which became practically insecure due to its small key size of 56 bits and increase in ... see more

Searchable encryption allows a remote server to search over encrypted documents without knowing the sensitive data contents. Prior searchable symmetric encryption schemes focus on single keyword search. Conjunctive Keyword Searches (CKS) schemes improve s... see more

With the continuous development of the computers networks, new problems have been posed in the process of keys management in the cryptographic systems. The main element in the cryptographic technologies is the keys management, as the cryptographic algorit... see more

Recently, a variety of chaos-based image encryption algorithms adopting the traditional permutation-diffusion structure have been suggested. Most of these algorithms cannot resist the powerful chosen-plaintext attack and chosen-ciphertext attack efficient... see more

In digital computing, cryptographic methods considers performance in both speed and security. This study aims to explore and improve a permutation-based symmetric chaotic cryptography technique called Chaotic Permutation Multicircular (CPMC). In this stud... see more

The teleoperation (telerobotic) systems often face two key challenges: the existence of communication delays between the master and slave site as well as the addition of force feedback to improve the userâ??s sense of presence. The first goal of this pape... see more

1 of 21.200 pages  |  10  records  |  more records»