|
[1]
|
Creating a Secure Environment for Confidential Data Transmission using Quantum BB84 Protocol
2025 7th International Conference on Intelligent Sustainable Systems (ICISS),
2025
DOI:10.1109/ICISS63372.2025.11076532
|
|
|
|
|
[2]
|
Wireless monitoring and transmission system for multi-sensor environmental data
Journal of Computing and Electronic Information Management,
2025
DOI:10.54097/m8752y39
|
|
|
|
|
[3]
|
Enhanced Framework for Authentic and Anonymous Data Sharing Over Cloud Storage Service
2024 International Conference on Intelligent Algorithms for Computational Intelligence Systems (IACIS),
2024
DOI:10.1109/IACIS61494.2024.10721986
|
|
|
|
|
[4]
|
Analysis of WeChat Mini Program Data Encryption Algorithm Based on Computer Network Security: AES Symmetric Encryption Algorithm
2024 International Conference on Image Processing, Computer Vision and Machine Learning (ICICML),
2024
DOI:10.1109/ICICML63543.2024.10957877
|
|
|
|
|
[5]
|
Rural regional economic data management based on blockchain technology
SN Applied Sciences,
2023
DOI:10.1007/s42452-023-05338-3
|
|
|
|
|
[6]
|
RETRACTED ARTICLE: Rural regional economic data management based on blockchain technology
SN Applied Sciences,
2023
DOI:10.1007/s42452-023-05338-3
|
|
|
|
|
[7]
|
Conversion of Clefia Algorithm to Decrease Memory Restrictions Encountered on IoT by Applying CMA Method
2022 International Conference on Artificial Intelligence, Big Data, Computing and Data Communication Systems (icABCD),
2022
DOI:10.1109/icABCD54961.2022.9856353
|
|
|
|
|
[8]
|
A Secure Cloud Storage Algorithm for University Financial Data Based on the Blockchain Technology
Mobile Information Systems,
2022
DOI:10.1155/2022/5030738
|
|
|
|