Author:
Veeresh V.,Parvathy L. Rama
Publisher
Springer Nature Singapore
Reference20 articles.
1. Smith TF, Waterman MS (1981) Identification of common molecular subsequences. J Mol Biol 147:195–197 (1981). G Identity-based encryption schemes—A review. J Multi Eng Sci Technol (JMEST). ISSN: 2458-9403, 6(12), December 2019, Special Issue
2. Comparative analysis of ıdentity-based encryption with traditional public key encryption ın wireless network
3. Int J Adv Res Sci Eng. IJARSE, 4(01), Jan 2015. ISSN-2319-8354(E). http://www.ijarse.com
4. Identity-based encryption from the weil pairing, appears in SIAM J Comput 32(3):586–615 (2003). An extended abstract of this Paper appears in the Proceedings of Crypto 2001, volume 2139 of Lecture Notes in Computer Science. Springer, Berlin, pp 213–229
5. Using identity-based cryptography as a foundation for an effective and secure cloud model for E-Health, exploration of human cognition using artificial ıntelligence in healthcare research article | Open Access Volume 2022 | Article ID 7016554