Abstract: The explosion of IoT edge devices has made data security, authenticity, and integrity increasingly difficult to guarantee in settings with limited resources. Low-power Internet of Things ...
Abstract: Secure Hash Algorithm (SHA) is a set of cryptographic hashing algorithms designed to generate fixed-size output hash value from input data of any size. This paper provide an efficient design ...
Tokenization is a crucial technology for ensuring the security and privacy of patient data in clinical research, pharmacovigilance, and drug safety monitoring. As healthcare increasingly integrates ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results