Found: 164
Select item for more details and to access through your institution.
Scientometric dimensions of cryptographic research.
- Published in:
- Scientometrics, 2015, v. 105, n. 1, p. 179, doi. 10.1007/s11192-015-1661-z
- By:
- Publication type:
- Article
Curvelets-based ECG steganography for data security.
- Published in:
- Electronics Letters (Wiley-Blackwell), 2016, v. 52, n. 4, p. 283, doi. 10.1049/el.2015.3218
- By:
- Publication type:
- Article
Power-aware hiding method for S-box protection.
- Published in:
- Electronics Letters (Wiley-Blackwell), 2014, v. 50, n. 22, p. 1604, doi. 10.1049/el.2014.1559
- By:
- Publication type:
- Article
Lattice approach to video steganography.
- Published in:
- Turkish Journal of Electrical Engineering & Computer Sciences, 2015, v. 23, n. Sup.1, p. 2074, doi. 10.3906/elk-1302-21
- By:
- Publication type:
- Article
MULTI-DOMAIN ACCESS CONTROL POLICY IN WIRELESS CLASSIFIED ENVIRONMENTS USING STEGANOGRAPHY.
- Published in:
- Issues in Information Systems, 2013, v. 14, n. 2, p. 393
- By:
- Publication type:
- Article
Cryptanalysis on majority-voting based self-recovery watermarking scheme.
- Published in:
- Telecommunication Systems, 2012, v. 49, n. 2, p. 231, doi. 10.1007/s11235-010-9380-5
- By:
- Publication type:
- Article
THE ROLE OF NUMBER THEORY IN MODERN CRYPTOGRAPHY.
- Published in:
- InSight: Rivier Academic Journal, 2012, v. 8, n. 2, p. 1
- By:
- Publication type:
- Article
The optimal split method of large integer multiplication for smart low-end devices on P2P ubiquitous networks.
- Published in:
- Peer-to-Peer Networking & Applications, 2014, v. 7, n. 4, p. 655, doi. 10.1007/s12083-012-0189-8
- By:
- Publication type:
- Article
Design and Development of Layered Security: Future Enhancements and Directions in Transmission.
- Published in:
- Sensors (14248220), 2016, v. 16, n. 1, p. 37, doi. 10.3390/s16010037
- By:
- Publication type:
- Article
A Robust Trust Establishment Scheme for Wireless Sensor Networks.
- Published in:
- Sensors (14248220), 2015, v. 15, n. 3, p. 7040, doi. 10.3390/s150307040
- By:
- Publication type:
- Article
Privacy-Preserving Data Aggregation in Two-Tiered Wireless Sensor Networks with Mobile Nodes.
- Published in:
- Sensors (14248220), 2014, v. 14, n. 11, p. 21174, doi. 10.3390/s141121174
- By:
- Publication type:
- Article
A Provably-Secure ECC-Based Authentication Scheme for Wireless Sensor Networks.
- Published in:
- Sensors (14248220), 2014, v. 14, n. 11, p. 21023, doi. 10.3390/s141121023
- By:
- Publication type:
- Article
A Trustworthy Key Generation Prototype Based on DDR3 PUF for Wireless Sensor Networks.
- Published in:
- Sensors (14248220), 2014, v. 14, n. 7, p. 11542, doi. 10.3390/s140711542
- By:
- Publication type:
- Article
Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography.
- Published in:
- Sensors (14248220), 2014, v. 14, n. 6, p. 10081, doi. 10.3390/s140610081
- By:
- Publication type:
- Article
Secure Chaotic Map Based Block Cryptosystem with Application to Camera Sensor Networks.
- Published in:
- Sensors (14248220), 2011, v. 11, n. 2, p. 1607, doi. 10.3390/s110201607
- By:
- Publication type:
- Article
AD-ASGKA - authenticated dynamic protocols for asymmetric group key agreement.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 11, p. 1340, doi. 10.1002/sec.1420
- By:
- Publication type:
- Article
Cryptanalysis of a certificateless aggregate signature scheme.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 11, p. 1353, doi. 10.1002/sec.1421
- By:
- Publication type:
- Article
Efficient chosen ciphertext secure identity-based encryption against key leakage attacks.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 11, p. 1417, doi. 10.1002/sec.1429
- By:
- Publication type:
- Article
Tweakable parallel OFB mode of operation with delayed thread synchronization.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 10, p. 1119, doi. 10.1002/sec.1404
- By:
- Publication type:
- Article
Provably secure identity-based encryption resilient to post-challenge continuous auxiliary input leakage.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 10, p. 1016, doi. 10.1002/sec.1396
- By:
- Publication type:
- Article
User-friendly random-grid-based visual secret sharing for general access structures.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 10, p. 966, doi. 10.1002/sec.1392
- By:
- Publication type:
- Article
A secure white-box SM4 implementation.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 10, p. 996, doi. 10.1002/sec.1394
- By:
- Publication type:
- Article
A survey of lightweight stream ciphers for embedded systems.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 10, p. 1226, doi. 10.1002/sec.1399
- By:
- Publication type:
- Article
Anonymous communication in overlay networks.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 3, p. 229, doi. 10.1002/sec.539
- By:
- Publication type:
- Article
Selectively chosen ciphertext security in threshold public-key encryption.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 3, p. 189, doi. 10.1002/sec.417
- By:
- Publication type:
- Article
Biclique cryptanalysis of MIBS-80 and PRESENT-80 block ciphers.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 1, p. 27, doi. 10.1002/sec.1375
- By:
- Publication type:
- Article
Cryptanalysis of a robust key agreement based on public key authentication.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 1, p. 19, doi. 10.1002/sec.1373
- By:
- Publication type:
- Article
Cryptanalysis and provable improvement of a chaotic maps-based mobile dynamic ID authenticated key agreement scheme.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 17, p. 2981, doi. 10.1002/sec.1225
- By:
- Publication type:
- Article
Identity-based universal re-encryption for mixnets.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 17, p. 2992, doi. 10.1002/sec.1226
- By:
- Publication type:
- Article
3S: three-signature path authentication for BGP security.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 17, p. 3002, doi. 10.1002/sec.1227
- By:
- Publication type:
- Article
A novel weighted threshold secret image sharing scheme<sup>†</sup>.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 17, p. 3083, doi. 10.1002/sec.1233
- By:
- Publication type:
- Article
A secure and privacy-preserving event reporting scheme for vehicular Ad Hoc networks.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 17, p. 3271, doi. 10.1002/sec.1251
- By:
- Publication type:
- Article
Construction of resilient Boolean functions with high nonlinearity and good algebraic degree.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 16, p. 2909, doi. 10.1002/sec.1218
- By:
- Publication type:
- Article
Improved conditional differential cryptanalysis.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 9, p. 1801, doi. 10.1002/sec.1144
- By:
- Publication type:
- Article
A new efficient signcryption scheme in the standard model.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 5, p. 778, doi. 10.1002/sec.1034
- By:
- Publication type:
- Article
Cryptanalysis of a certificateless identification scheme.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 2, p. 122, doi. 10.1002/sec.963
- By:
- Publication type:
- Article
A novel image steganography scheme based on morphological associative memory and permutation schema.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 2, p. 110, doi. 10.1002/sec.962
- By:
- Publication type:
- Article
A high-capacity and low-distortion 3D polygonal mesh steganography using surfacelet transform.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 2, p. 159, doi. 10.1002/sec.968
- By:
- Publication type:
- Article
Equivalent public keys and a key substitution attack on the schemes from vector decomposition.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 8, p. 1274, doi. 10.1002/sec.860
- By:
- Publication type:
- Article
Steganalysis of least significant bit matching using multi-order differences.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 8, p. 1283, doi. 10.1002/sec.864
- By:
- Publication type:
- Article
PPGJ: A privacy-preserving general join for outsourced encrypted database.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 8, p. 1232, doi. 10.1002/sec.854
- By:
- Publication type:
- Article
Identity-based optimistic fair exchange in the standard model.
- Published in:
- Security & Communication Networks, 2013, v. 6, n. 8, p. 1010, doi. 10.1002/sec.652
- By:
- Publication type:
- Article
Unified phase and magnitude speech spectra data hiding algorithm.
- Published in:
- Security & Communication Networks, 2013, v. 6, n. 8, p. 961, doi. 10.1002/sec.644
- By:
- Publication type:
- Article
Cipher feedback mode under go-back-N and selective-reject protocols in error channels.
- Published in:
- Security & Communication Networks, 2013, v. 6, n. 8, p. 942, doi. 10.1002/sec.638
- By:
- Publication type:
- Article
Cycle-walking revisited: consistency, security, and efficiency.
- Published in:
- Security & Communication Networks, 2013, v. 6, n. 8, p. 985, doi. 10.1002/sec.648
- By:
- Publication type:
- Article
Cryptanalysis of MICKEY family of stream ciphers.
- Published in:
- Security & Communication Networks, 2013, v. 6, n. 8, p. 936, doi. 10.1002/sec.637
- By:
- Publication type:
- Article
SECURE IMAGE STEGANOGRAPHY USING CRYPTOGRAPHY AND IMAGE TRANSPOSITION.
- Published in:
- NED University Journal of Research, 2015, v. 12, n. 4, p. 81
- By:
- Publication type:
- Article
THE ENHANCEMENT OF ZHOU et al.'s QUANTUM SECRET SHARING PROTOCOL.
- Published in:
- International Journal of Modern Physics C: Computational Physics & Physical Computation, 2009, v. 20, n. 10, p. 1531, doi. 10.1142/S0129183109014576
- By:
- Publication type:
- Article
CRYPTANALYSIS OF RSA WITH CONSTRAINED KEYS.
- Published in:
- International Journal of Number Theory, 2009, v. 5, n. 2, p. 311, doi. 10.1142/S1793042109002122
- By:
- Publication type:
- Article
Quantum Private Query Protocol Based on Two Non-Orthogonal States.
- Published in:
- Entropy, 2016, v. 18, n. 5, p. 163, doi. 10.3390/e18050163
- By:
- Publication type:
- Article