Vyzkoušejte nový nástroj s podporou AI
Summon Research Assistant
BETA
Loading…
Loading…
Loading…
Loading…
Implementing an Efficient Secure Attribute-Based Encryption System for IoV Using Association Rules
Han, Mu, Zhu, Mengli, Cheng, Pengzhou, Yin, Zhikun, Qu, Haixin
Published in Symmetry (Basel) (01.07.2021)
Published in Symmetry (Basel) (01.07.2021)
Get full text
Journal Article
Loading…
Loading…
Loading…
Development and Pilot-Test of Blockchain-Based MyHealthData Platform
Bae, Ye-Seul, Park, Yujin, Kim, Taekhoon, Ko, Taehoon, Kim, Min-Soo, Lee, Eunsol, Kim, Hee-Chan, Yoon, Hyung-Jin
Published in Applied sciences (01.09.2021)
Published in Applied sciences (01.09.2021)
Get full text
Journal Article
Loading…
Parental and self-reported dietary and physical activity habits in pre-school children and their socio-economic determinants
Sotos-Prieto, Mercedes, Santos-Beneit, Gloria, Pocock, Stuart, Redondo, Juliana, Fuster, Valentín, Peñalvo, José L
Published in Public health nutrition (01.02.2015)
Published in Public health nutrition (01.02.2015)
Get full text
Journal Article
Loading…
Loading…
Loading…
Loading…
Data-encryption-based purpose-specific access control
Year of Publication 28.09.2021
Get full text
Patent
Loading…
Loading…
The Passing Procedure Used Is: The Adapted Procedure Open. It Is Subject To The Provisions Of Articles L. 2123-1 And R. 2123-1 1 Of The Public Order Code.this Consultation Has 2 Compulsory Variants: -variant 01 Encrypting Thevenet-variant 02 Encryption [Tender documents : T471667164]
Published in MENA Report
(30.03.2022)
Get full text
Newsletter
Loading…
Loading…
Cybersecurity as a response to combating cybercrime: Demystifying the prevailing threats and offering recommendations to the African regions
Mphatheni, Mandlenkosi Richard, Maluleke, Witness
Published in International journal of research in business and social science (05.06.2022)
Published in International journal of research in business and social science (05.06.2022)
Get full text
Journal Article
Loading…
Person authentication based on eye-closed and visual stimulation using EEG signals
Yap, Hui Yen, Choo, Yun-Huoy, Mohd Yusoh, Zeratul Izzah, Khoh, Wee How
Published in Brain informatics (01.12.2021)
Published in Brain informatics (01.12.2021)
Get full text
Journal Article
Loading…
Examining the Social Networks of Malware Writers and Hackers
Holt, Thomas J, Strumsky, Deborah, Smirnova, Olga, Kilger, Max
Published in International journal of cyber criminology (01.01.2012)
Get full text
Published in International journal of cyber criminology (01.01.2012)
Journal Article