Found: 650
Select item for more details and to access through your institution.
Securing the Digital Commerce Spectrum and Cyber Security Strategies for Web, E-commerce, M-commerce, and E-mail Security.
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 14, n. 1, p. 34, doi. 10.54216/JCIM.140103
- By:
- Publication type:
- Article
Novel image pixel scrambling technique for efficient color image encryption in resource-constrained IoT devices.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 29, p. 72789, doi. 10.1007/s11042-024-18620-2
- By:
- Publication type:
- Article
A Stimuli-Responsive Smart Lanthanide Nanocomposite for Multidimensional Optical Recording and Encryption.
- Published in:
- Angewandte Chemie, 2017, v. 129, n. 10, p. 2733, doi. 10.1002/ange.201700011
- By:
- Publication type:
- Article
A cloud compatible DNA coded security solution for multimedia file sharing & storage.
- Published in:
- Multimedia Tools & Applications, 2019, v. 78, n. 23, p. 33837, doi. 10.1007/s11042-019-08166-z
- By:
- Publication type:
- Article
A new construction of confusion component of block ciphers.
- Published in:
- Multimedia Tools & Applications, 2019, v. 78, n. 22, p. 32585, doi. 10.1007/s11042-019-07866-w
- By:
- Publication type:
- Article
A novel image encryption scheme based on Arnold scrambling and Lucas series.
- Published in:
- Multimedia Tools & Applications, 2019, v. 78, n. 19, p. 27611, doi. 10.1007/s11042-019-07881-x
- By:
- Publication type:
- Article
Design and Implementation of novel datapath designs of lightweight cipher RECTANGLE for resource constrained environment.
- Published in:
- Multimedia Tools & Applications, 2019, v. 78, n. 16, p. 23659, doi. 10.1007/s11042-019-7587-3
- By:
- Publication type:
- Article
Color image encryption algorithm based on customized globally coupled map lattices.
- Published in:
- Multimedia Tools & Applications, 2019, v. 78, n. 5, p. 6191, doi. 10.1007/s11042-018-6326-5
- By:
- Publication type:
- Article
Cryptanalysis of hash functions based on blockciphers suitable for IoT service platform security.
- Published in:
- Multimedia Tools & Applications, 2019, v. 78, n. 3, p. 3107, doi. 10.1007/s11042-018-5630-4
- By:
- Publication type:
- Article
Publicly verifiable watermarking scheme for intellectual property protection using quantum Chaos and bit plane complexity slicing.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 24, p. 31737, doi. 10.1007/s11042-018-6226-8
- By:
- Publication type:
- Article
Separable reversible data hiding in encrypted images with improved security and capacity.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 23, p. 30749, doi. 10.1007/s11042-018-6187-y
- By:
- Publication type:
- Article
A dynamic approach for a lightweight and secure cipher for medical images.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 23, p. 31397, doi. 10.1007/s11042-018-6051-0
- By:
- Publication type:
- Article
A multithreaded programming approach for multimedia big data: encryption system.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 9, p. 10997, doi. 10.1007/s11042-017-4873-9
- By:
- Publication type:
- Article
Achieving secure data access control and efficient key updating in mobile multimedia sensor networks.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 4, p. 4477, doi. 10.1007/s11042-017-4804-9
- By:
- Publication type:
- Article
Cryptanalyzing an image encryption algorithm based on scrambling and Veginère cipher.
- Published in:
- Multimedia Tools & Applications, 2016, v. 75, n. 10, p. 5439, doi. 10.1007/s11042-015-2511-y
- By:
- Publication type:
- Article
A robust image encryption algorithm resistant to attacks using DNA and chaotic logistic maps.
- Published in:
- Multimedia Tools & Applications, 2016, v. 75, n. 10, p. 5455, doi. 10.1007/s11042-015-2515-7
- By:
- Publication type:
- Article
A fuzzy ontology-based context-aware encryption approach in IoT through device and information classification.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 16, p. 23311, doi. 10.1007/s11227-024-06317-0
- By:
- Publication type:
- Article
SDESA: secure cloud computing with gradient deep belief network and congruential advanced encryption.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 15, p. 23147, doi. 10.1007/s11227-024-06322-3
- By:
- Publication type:
- Article
Color image encryption based on novel kolam scrambling and modified 2D logistic cascade map (2D LCM).
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 2, p. 2164, doi. 10.1007/s11227-023-05539-y
- By:
- Publication type:
- Article
Logic Realization of Galois Field for AES SBOX using Quantum Dot Cellular Automata.
- Published in:
- Journal of Supercomputing, 2023, v. 79, n. 3, p. 3024, doi. 10.1007/s11227-022-04779-8
- By:
- Publication type:
- Article
Time-variant attribute-based multitype encryption algorithm for improved cloud data security using user profile.
- Published in:
- Journal of Supercomputing, 2020, v. 76, n. 8, p. 6094, doi. 10.1007/s11227-019-03118-8
- By:
- Publication type:
- Article
A self-adjusting quantum key renewal management scheme in classical network symmetric cryptography.
- Published in:
- Journal of Supercomputing, 2020, v. 76, n. 6, p. 4212, doi. 10.1007/s11227-018-2276-y
- By:
- Publication type:
- Article
A context-aware encryption protocol suite for edge computing-based IoT devices.
- Published in:
- Journal of Supercomputing, 2020, v. 76, n. 4, p. 2548, doi. 10.1007/s11227-019-03021-2
- By:
- Publication type:
- Article
Enhanced signature RTD transaction scheme based on Chebyshev polynomial for mobile payments service in IoT device environment.
- Published in:
- Journal of Supercomputing, 2019, v. 75, n. 8, p. 4617, doi. 10.1007/s11227-018-2546-8
- By:
- Publication type:
- Article
A fault-resistant implementation of AES using differential bytes between input and output.
- Published in:
- Journal of Supercomputing, 2014, v. 67, n. 3, p. 615, doi. 10.1007/s11227-013-0950-7
- By:
- Publication type:
- Article
A holistic approach examining RFID design for security and privacy.
- Published in:
- Journal of Supercomputing, 2013, v. 64, n. 3, p. 664, doi. 10.1007/s11227-010-0497-9
- By:
- Publication type:
- Article
Synthesis‐free backscatter directional modulation communication using Van‐Atta arrays.
- Published in:
- IET Microwaves, Antennas & Propagation (Wiley-Blackwell), 2022, v. 16, n. 10, p. 654, doi. 10.1049/mia2.12279
- By:
- Publication type:
- Article
Revocable identity‐based matchmaking encryption in the standard model.
- Published in:
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 4, p. 567, doi. 10.1049/ise2.12116
- By:
- Publication type:
- Article
A New Key Generation to Greate Enhanced Security Version of AES Encryption Method .
- Published in:
- Journal of College of Education, 2021, n. 2, p. 1
- By:
- Publication type:
- Article
SOME RECENT ADVANCES IN NUMBER THEORY.
- Published in:
- Journal of Ramanujan Society of Mathematics & Mathematical Sciences, 2017, v. 6, n. 1, p. 145
- By:
- Publication type:
- Article
ONLINE NATIONAL CITIZEN'S ID RENEWAL SYSTEM.
- Published in:
- i-Manager's Journal on Computer Science, 2023, v. 11, n. 2, p. 12, doi. 10.26634/jcom.11.2.20060
- By:
- Publication type:
- Article
Magic cube puzzle approach for image encryption.
- Published in:
- International Journal of Advances in Intelligent Informatics, 2020, v. 6, n. 3, p. 290, doi. 10.26555/ijain.v6i3.422
- By:
- Publication type:
- Article
Audio Steganography Using Least Significant Bit and AES Cryptographic Algorithm.
- Published in:
- ESTEEM, 2018, v. 14, p. 66
- By:
- Publication type:
- Article
一种多通道 2. 4 GHz 有源射频识别系统设计.
- Published in:
- Telecommunication Engineering, 2021, v. 61, n. 9, p. 1102, doi. 10.3969/j.issn.1001-893x.2021.09.007
- By:
- Publication type:
- Article
A new color image encryption algorithm based on dual scrambling about pixel position scrambling and RGB intensity value.
- Published in:
- Journal of Zhengzhou University of Light Industry, Natural Science Edition, 2014, v. 29, n. 6, p. 61, doi. 10.3969/j.issn.2095-476X.2014.06.014
- By:
- Publication type:
- Article
Secure Smart Contract Based on Blockchain to Prevent the Non-Repudiation Phenomenon.
- Published in:
- Baghdad Science Journal, 2024, v. 21, n. 1, p. 234, doi. 10.21123/bsj.2023.4612
- By:
- Publication type:
- Article
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms.
- Published in:
- Baghdad Science Journal, 2023, v. 20, n. 4, p. 1414, doi. 10.21123/bsj.2023.7315
- By:
- Publication type:
- Article
Text Multilevel Encryption Using New Key Exchange Protocol.
- Published in:
- Baghdad Science Journal, 2022, v. 19, n. 3, p. 619, doi. 10.21123/bsj.2022.19.3.0619
- By:
- Publication type:
- Article
A Modified Symmetric Key Fully Homomorphic Encryption Scheme Based on Read-Muller Code.
- Published in:
- Baghdad Science Journal, 2021, v. 18, p. 899, doi. 10.21123/bsj.2021.18.2(Suppl.).0899
- By:
- Publication type:
- Article
Improved Image Security in Internet of Thing (IOT) Using Multiple Key AES .
- Published in:
- Baghdad Science Journal, 2021, v. 18, n. 2, p. 417, doi. 10.21123/bsj.2021.18.2.0417
- By:
- Publication type:
- Article
A New Cipher Based on Feistel Structure and Chaotic Maps.
- Published in:
- Baghdad Science Journal, 2019, v. 16, n. 1, p. 270, doi. 10.21123/bsj.2019.16.1(Suppl.).0270
- By:
- Publication type:
- Article
Learning the basics of cryptography with practical examples.
- Published in:
- REiDoCrea: Revista Electrónica de Investigación y Docencia Creativa, 2022, v. 11, p. 274
- By:
- Publication type:
- Article
Development and Analysis of Symmetric Encryption Algorithm Qamal Based on a Substitution-permutation Network.
- Published in:
- International Journal of Electronics & Telecommunications, 2021, v. 67, n. 1, p. 127, doi. 10.24425/ijet.2021.135954
- By:
- Publication type:
- Article
Improved Markov Chain Monte Carlo method for cryptanalysis substitution-transposition cipher.
- Published in:
- Monte Carlo Methods & Applications, 2016, v. 22, n. 4, p. 323, doi. 10.1515/mcma-2016-0116
- By:
- Publication type:
- Article
Frequently asked questions about the AFDI proposal.
- Published in:
- Planetarian, 2020, v. 49, n. 1, p. 26
- Publication type:
- Article
High Performance Pipelined AES Implementation with AMBA AHB Interface for SoC's.
- Published in:
- Turkish Online Journal of Qualitative Inquiry, 2021, v. 12, n. 10, p. 1041
- By:
- Publication type:
- Article
Design and implementation of a cryptographic algorithm based on the AES advanced encryption standard for UHF RFID systems.
- Published in:
- Telkomnika, 2024, v. 22, n. 3, p. 576, doi. 10.12928/TELKOMNIKA.v22i3.25520
- By:
- Publication type:
- Article
Incorporating rivest-shamir-adleman algorithm and advanced encryption standard in payment gateway system.
- Published in:
- Telkomnika, 2024, v. 22, n. 3, p. 629, doi. 10.12928/TELKOMNIKA.v22i3.25578
- By:
- Publication type:
- Article
One to many (new scheme for symmetric cryptography).
- Published in:
- Telkomnika, 2023, v. 21, n. 4, p. 762, doi. 10.12928/TELKOMNIKA.v21i4.24789
- By:
- Publication type:
- Article
Medical image encryption using multi chaotic maps.
- Published in:
- Telkomnika, 2023, v. 21, n. 3, p. 556, doi. 10.12928/TELKOMNIKA.v21i3.24324
- By:
- Publication type:
- Article