-
1
On DNA Signatures, Their Dual-Use Potential for GMO Counterfeiting, and a Cyber-Based Security Solution
Published 2019-08-01Subjects: Get full text
Article -
2
Secure User Authentication With Information Theoretic Security Using Secret Sharing-Based Secure Computation
Published 2025-01-01Subjects: Get full text
Article -
3
A Secure Authentication and Key Exchange Protocol for Vehicles to Infrastructure Network
Published 2025-02-01Subjects: Get full text
Article -
4
IoT Solution for AI-Enabled PRIVACY-PREServing with Big Data Transferring: An Application for Healthcare Using Blockchain
Published 2021-08-01Subjects: Get full text
Article