Data Security Utilizing a Memristive Coupled Neural Network in 3D Models

M Gabr, A Diab, HT Elshoush, YL Chen, LY Por… - IEEE …, 2024 - ieeexplore.ieee.org
This article proposes a novel double data security algorithm that first encrypts sensitive data
using a two-stage encryption method based on numerical solutions from a fractional-order …

[PDF][PDF] Analysis of the possibility of hiding decomposed information in the virtual reality environment

T Szymczyk, P Czajka - Advances in Science and Technology Research …, 2025 - astrj.com
Information is a fundamental resource, generated by mankind, it is through it that one can
reduce or eliminate the effects of a cataclysm, make or lose a fortune, or even shorten a war …