Found: 666
Select item for more details and to access through your institution.
A Stimuli-Responsive Smart Lanthanide Nanocomposite for Multidimensional Optical Recording and Encryption.
- Published in:
- Angewandte Chemie, 2017, v. 129, n. 10, p. 2733, doi. 10.1002/ange.201700011
- By:
- Publication type:
- Article
Heterogeneous iris certification method with universal sensors and safety output based on multisource fusion features and entropy labels of lightweight samples.
- Published in:
- Journal of Electronic Imaging, 2020, v. 29, n. 4, p. 43023, doi. 10.1117/1.JEI.29.4.043023
- By:
- Publication type:
- Article
Magic cube puzzle approach for image encryption.
- Published in:
- International Journal of Advances in Intelligent Informatics, 2020, v. 6, n. 3, p. 290, doi. 10.26555/ijain.v6i3.422
- By:
- Publication type:
- Article
R-OO-KASE: Revocable Online/Offline Key Aggregate Searchable Encryption.
- Published in:
- Data Science & Engineering, 2020, v. 5, n. 4, p. 391, doi. 10.1007/s41019-020-00136-y
- By:
- Publication type:
- Article
A classical approach for hiding encryption key in the same encrypted text document.
- Published in:
- Journal of Kufa for Mathematics & Computer, 2018, v. 5, n. 1, p. 25, doi. 10.31642/jokmc/2018/050104
- By:
- Publication type:
- Article
Internet of Things Security using New Chaotic System and Lightweight AES.
- Published in:
- Journal of Qadisiyah Computer Science & Mathematics, 2019, v. 11, n. 2, p. 45, doi. 10.29304/jqcm.2019.11.2.571
- By:
- Publication type:
- Article
Design of keystream Generator utilizing Firefly Algorithm.
- Published in:
- Journal of Qadisiyah Computer Science & Mathematics, 2018, v. 10, n. 3, p. 91, doi. 10.29304/jqcm.2018.10.3.441
- By:
- Publication type:
- Article
BUILDING A HYBRID SECURE SOCKET LAYER PROTOCOL.
- Published in:
- Scientific Research & Education in the Air Force - AFASES, 2014, v. 1, p. 349
- By:
- Publication type:
- Article
Mode-pairing quantum key distribution.
- Published in:
- Nature Communications, 2022, v. 13, n. 1, p. 1, doi. 10.1038/s41467-022-31534-7
- By:
- Publication type:
- Article
On Circulant-Like Rhotrices over Finite Fields.
- Published in:
- Applications & Applied Mathematics, 2017, v. 12, n. 1, p. 506
- By:
- Publication type:
- Article
APPLYING THE MODULAR ENCRYPTION STANDARD TO MOBILE CLOUD COMPUTING TO IMPROVE THE SAFETY OF HEALTH DATA.
- Published in:
- Journal of Pharmaceutical Negative Results, 2022, v. 13, p. 1911, doi. 10.47750/pnr.2022.13.S08.231
- By:
- Publication type:
- Article
Enhanced Security in Supply Chain Management System Using AES and Md5 Algorithms.
- Published in:
- Journal of Pharmaceutical Negative Results, 2022, v. 13, p. 78, doi. 10.47750/pnr.2022.13.S03.014
- By:
- Publication type:
- Article
Incorporating rivest-shamir-adleman algorithm and advanced encryption standard in payment gateway system.
- Published in:
- Telkomnika, 2024, v. 22, n. 3, p. 629, doi. 10.12928/TELKOMNIKA.v22i3.25578
- By:
- Publication type:
- Article
Design and implementation of a cryptographic algorithm based on the AES advanced encryption standard for UHF RFID systems.
- Published in:
- Telkomnika, 2024, v. 22, n. 3, p. 576, doi. 10.12928/TELKOMNIKA.v22i3.25520
- By:
- Publication type:
- Article
One to many (new scheme for symmetric cryptography).
- Published in:
- Telkomnika, 2023, v. 21, n. 4, p. 762, doi. 10.12928/TELKOMNIKA.v21i4.24789
- By:
- Publication type:
- Article
Medical image encryption using multi chaotic maps.
- Published in:
- Telkomnika, 2023, v. 21, n. 3, p. 556, doi. 10.12928/TELKOMNIKA.v21i3.24324
- By:
- Publication type:
- Article
A survey on security and policy aspects of blockchain technology.
- Published in:
- Telkomnika, 2023, v. 21, n. 2, p. 302, doi. 10.12928/TELKOMNIKA.v21i2.24738
- By:
- Publication type:
- Article
Improved anti-noise attack ability of image encryption algorithm using de-noising technique.
- Published in:
- Telkomnika, 2020, v. 18, n. 6, p. 3080, doi. 10.12928/TELKOMNIKA.v18i6.16384
- By:
- Publication type:
- Article
Power analysis attack against encryption devices: a comprehensive analysis of AES, DES, and BC3.
- Published in:
- Telkomnika, 2019, v. 17, n. 3, p. 1282, doi. 10.12928/TELKOMNIKA.v17i3.9384
- By:
- Publication type:
- Article
Asymmetric Cryptography Based on the Tropical Jones Matrix.
- Published in:
- Symmetry (20738994), 2024, v. 16, n. 4, p. 456, doi. 10.3390/sym16040456
- By:
- Publication type:
- Article
Light and Secure Encryption Technique Based on Artificially Induced Chaos and Nature-Inspired Triggering Method.
- Published in:
- Symmetry (20738994), 2022, v. 14, n. 2, p. N.PAG, doi. 10.3390/sym14020218
- By:
- Publication type:
- Article
Enhancement of an Optimized Key for Database Sanitization to Ensure the Security and Privacy of an Autism Dataset.
- Published in:
- Symmetry (20738994), 2021, v. 13, n. 10, p. 1912, doi. 10.3390/sym13101912
- By:
- Publication type:
- Article
Intra-Block Correlation Based Reversible Data Hiding in Encrypted Images Using Parametric Binary Tree Labeling.
- Published in:
- Symmetry (20738994), 2021, v. 13, n. 6, p. 1072, doi. 10.3390/sym13061072
- By:
- Publication type:
- Article
Decentralized Broadcast Encryption Schemes with Constant Size Ciphertext and Fast Decryption.
- Published in:
- Symmetry (20738994), 2020, v. 12, n. 6, p. 969, doi. 10.3390/sym12060969
- By:
- Publication type:
- Article
Symmetric Key Encryption Based on Rotation-Translation Equation.
- Published in:
- Symmetry (20738994), 2020, v. 12, n. 1, p. 73, doi. 10.3390/sym12010073
- By:
- Publication type:
- Article
Algebraic Properties of the Block Cipher DESL.
- Published in:
- Symmetry (20738994), 2019, v. 11, n. 11, p. 1411, doi. 10.3390/sym11111411
- By:
- Publication type:
- Article
Efficient Hierarchical Identity-Based Encryption System for Internet of Things Infrastructure.
- Published in:
- Symmetry (20738994), 2019, v. 11, n. 7, p. 913, doi. 10.3390/sym11070913
- By:
- Publication type:
- Article
Cryptanalysis and Improvement on an Image Encryption Algorithm Design Using a Novel Chaos Based S-Box.
- Published in:
- Symmetry (20738994), 2018, v. 10, n. 9, p. 399, doi. 10.3390/sym10090399
- By:
- Publication type:
- Article
Chinese Remainder Theorem-Based Secret Image Sharing with Small-Sized Shadow Images.
- Published in:
- Symmetry (20738994), 2018, v. 10, n. 8, p. 340, doi. 10.3390/sym10080340
- By:
- Publication type:
- Article
Two-Round Password-Only Authenticated Key Exchange in the Three-Party Setting.
- Published in:
- Symmetry (20738994), 2015, v. 7, n. 1, p. 105, doi. 10.3390/sym7010105
- By:
- Publication type:
- Article
Converting pairing-based cryptosystems from composite to prime order setting – A comparative analysis.
- Published in:
- Journal of Mathematical Cryptology, 2018, v. 12, n. 3, p. 159, doi. 10.1515/jmc-2017-0042
- By:
- Publication type:
- Article
Multiple differential-zero correlation linear cryptanalysis of reduced-round CAST-256.
- Published in:
- Journal of Mathematical Cryptology, 2017, v. 11, n. 2, p. 55, doi. 10.1515/jmc-2016-0054
- By:
- Publication type:
- Article
Unconditionally secure signature schemes revisited.
- Published in:
- Journal of Mathematical Cryptology, 2016, v. 10, n. 1, p. 35, doi. 10.1515/jmc-2016-0002
- By:
- Publication type:
- Article
A Chaos-Based Encryption Scheme for DCT Precoded OFDM-Based Visible Light Communication Systems.
- Published in:
- Journal of Electrical & Computer Engineering, 2016, p. 1, doi. 10.1155/2016/2326563
- By:
- Publication type:
- Article
Genetic Code for Amino Acids using Huffman Trees.
- Published in:
- Journal of Sugar Beet Research, 2014, v. 6, n. 1, p. 53
- By:
- Publication type:
- Article
Fully secure non-monotonic access structure CP-ABE scheme.
- Published in:
- KSII Transactions on Internet & Information Systems, 2018, v. 12, n. 3, p. 1315, doi. 10.3837/tiis.2018.03.019
- By:
- Publication type:
- Article
Bitwise Collision Attack Based on Second-Order Distance.
- Published in:
- KSII Transactions on Internet & Information Systems, 2017, v. 11, n. 3, p. 1802, doi. 10.3837/tiis.2017.03.030
- By:
- Publication type:
- Article
Quantized DCT Coefficient Category Address Encryption for JPEG Image.
- Published in:
- KSII Transactions on Internet & Information Systems, 2016, v. 10, n. 4, p. 1790, doi. 10.3837/tiis.2016.04.018
- By:
- Publication type:
- Article
Efficient Anonymous Broadcast Encryption with Adaptive Security.
- Published in:
- KSII Transactions on Internet & Information Systems, 2015, v. 9, n. 11, p. 4680, doi. 10.3837/tiis.2015.11.024
- By:
- Publication type:
- Article
New Constructions of Hierarchical Attribute-Based Encryption for Fine-Grained Access Control in Cloud Computing.
- Published in:
- KSII Transactions on Internet & Information Systems, 2013, v. 7, n. 5, p. 1343, doi. 10.3837/tiis.2013.05.023
- By:
- Publication type:
- Article
Hybrid Encryption Algorithm for Sensitive Information of College Physical Fitness in Cloud Storage Environment.
- Published in:
- Journal of Sensors, 2022, p. 1, doi. 10.1155/2022/1552437
- By:
- Publication type:
- Article
Comparing low and medium cost computer-based technologies suitable for cryptographic attacks.
- Published in:
- Logic Journal of the IGPL, 2019, v. 27, n. 2, p. 177, doi. 10.1093/jigpal/jzy031
- By:
- Publication type:
- Article
A protocol to encrypt digital images using chaotic maps and memory cellular automata.
- Published in:
- Logic Journal of the IGPL, 2015, v. 23, n. 3, p. 485, doi. 10.1093/jigpal/jzv013
- By:
- Publication type:
- Article
An innovative privacy preservation and security framework with fog nodes in enabled vanet system using hybrid encryption techniques.
- Published in:
- Peer-to-Peer Networking & Applications, 2024, v. 17, n. 4, p. 2065, doi. 10.1007/s12083-024-01672-4
- By:
- Publication type:
- Article
SFIM: Identify user behavior based on stable features.
- Published in:
- Peer-to-Peer Networking & Applications, 2021, v. 14, n. 6, p. 3674, doi. 10.1007/s12083-021-01214-2
- By:
- Publication type:
- Article
Lightweight and secure PUF-based authenticated key agreement scheme for smart grid.
- Published in:
- Peer-to-Peer Networking & Applications, 2020, v. 13, n. 5, p. 1616, doi. 10.1007/s12083-020-00911-8
- By:
- Publication type:
- Article
P2P networking based internet of things (IoT) sensor node authentication by Blockchain.
- Published in:
- Peer-to-Peer Networking & Applications, 2020, v. 13, n. 2, p. 579, doi. 10.1007/s12083-019-00739-x
- By:
- Publication type:
- Article
Secure and private key management scheme in big data networking.
- Published in:
- Peer-to-Peer Networking & Applications, 2018, v. 11, n. 5, p. 992, doi. 10.1007/s12083-017-0579-z
- By:
- Publication type:
- Article
Serial number based encryption and its application for mobile social networks.
- Published in:
- Peer-to-Peer Networking & Applications, 2017, v. 10, n. 2, p. 332, doi. 10.1007/s12083-016-0445-4
- By:
- Publication type:
- Article
Key exchange process of PIM-SM-based for Multiple Group Communication in P2P.
- Published in:
- Peer-to-Peer Networking & Applications, 2015, v. 8, n. 4, p. 587, doi. 10.1007/s12083-014-0274-2
- By:
- Publication type:
- Article