Works matching DE "PUBLIC key cryptography"
Results: 1961
Verifikasi Quick Response Code dengan Vigenere Cipher dan Multi-Factor RSA.
- Published in:
- Techno.com, 2025, v. 24, n. 1, p. 240, doi. 10.62411/tc.v24i1.12192
- By:
- Publication type:
- Article
ОЦІНКА ВЛАСТИВОСТЕЙ КРИПТО-КОДОВИХ КОНСТРУКЦІЙ НА LDPC-КОДАХ.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2024, v. 30, n. 2, p. 313, doi. 10.18372/2225-5036.30.19244
- By:
- Publication type:
- Article
The Impact of Technology on Testate Succession in South Africa.
- Published in:
- Potchefstroom Electronic Law Journal, 2024, v. 27, p. 1, doi. 10.17159/1727-3781/2024/v27i0a15677
- By:
- Publication type:
- Article
Securing Automatic Identification System Communications Using Physical-Layer Key Generation Protocol.
- Published in:
- Journal of Marine Science & Engineering, 2025, v. 13, n. 2, p. 386, doi. 10.3390/jmse13020386
- By:
- Publication type:
- Article
Oracles and Signatures.
- Published in:
- UMAP Journal, 2018, v. 39, n. 4, p. 373
- By:
- Publication type:
- Article
10 Minutes with a Quantum Cryptography Expert.
- Published in:
- 2010
- Publication type:
- Interview
Quantum-safe multi-server password-based authenticated key exchange protocol.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 24, p. 65011, doi. 10.1007/s11042-023-17984-1
- By:
- Publication type:
- Article
An efficient Moving object, Encryption, Compression and Interpolation technique for video steganography.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 23, p. 1, doi. 10.1007/s11042-023-17930-1
- By:
- Publication type:
- Article
Robust blind image watermarking scheme using a modified embedding process based on differential method in DTCWT-DCT.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 22, p. 61379, doi. 10.1007/s11042-024-18185-0
- By:
- Publication type:
- Article
An image compression-then-encryption algorithm using piecewise asymptotic deterministic random measurement matrix.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 21, p. 60117, doi. 10.1007/s11042-023-17940-z
- By:
- Publication type:
- Article
A blockchain-based security system with light cryptography for user authentication security.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 17, p. 52451, doi. 10.1007/s11042-023-17643-5
- By:
- Publication type:
- Article
An efficient byzantine consensus mechanism based on healthcare sector in blockchain.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 17, p. 51129, doi. 10.1007/s11042-023-17548-3
- By:
- Publication type:
- Article
Innovative chaotic dragon fractal (ChDrFr) shapes for efficient encryption applications: a new highly secure image encryption algorithm.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 17, p. 50449, doi. 10.1007/s11042-023-17183-y
- By:
- Publication type:
- Article
Intrusion detection in cyber-physical system using rsa blockchain technology.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 16, p. 48119, doi. 10.1007/s11042-023-17576-z
- By:
- Publication type:
- Article
Ring signature-based blockchain for guaranteeing privacy preservation in online social networks.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 16, p. 47151, doi. 10.1007/s11042-023-17413-3
- By:
- Publication type:
- Article
Multiple colour image encryption using multiple parameter FrDCT, 3D Arnold transform and RSA.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 16, p. 48563, doi. 10.1007/s11042-023-17166-z
- By:
- Publication type:
- Article
A secure color image dual watermarking combining block feature modulation and voting mechanism for authentication and copyright protection.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 16, p. 46893, doi. 10.1007/s11042-023-17122-x
- By:
- Publication type:
- Article
Reversible data hiding strategy exploiting circular distance interpolation utilizing optimal pixel adjustment with error substitution.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 16, p. 48949, doi. 10.1007/s11042-023-17014-0
- By:
- Publication type:
- Article
Chaotic coyote optimization algorithm for image encryption and steganography.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 7, p. 20861, doi. 10.1007/s11042-023-16240-w
- By:
- Publication type:
- Article
Improving the performance of authentication protocols using efficient modular multi exponential technique.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 4, p. 11061, doi. 10.1007/s11042-023-15726-x
- By:
- Publication type:
- Article
Watermarking approach based on Hermite transform and a sliding window algorithm.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 30, p. 47635, doi. 10.1007/s11042-023-15324-x
- By:
- Publication type:
- Article
A robust semi-fragile watermarking system using Pseudo-Zernike moments and dual tree complex wavelet transform for social media content authentication.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 28, p. 43367, doi. 10.1007/s11042-023-15177-4
- By:
- Publication type:
- Article
Evolution of Blockchain and consensus mechanisms & its real-world applications.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 22, p. 34363, doi. 10.1007/s11042-023-14624-6
- By:
- Publication type:
- Article
Securing encrypted image information in audio data.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 21, p. 33063, doi. 10.1007/s11042-023-14735-0
- By:
- Publication type:
- Article
High capacity reversible data hiding in encrypted images using multi-MSB data hiding mechanism with elliptic curve cryptography.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 18, p. 28087, doi. 10.1007/s11042-023-14683-9
- By:
- Publication type:
- Article
A construction of post quantum secure authenticated key agreement design for mobile digital rights management system.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 17, p. 26643, doi. 10.1007/s11042-023-14937-6
- By:
- Publication type:
- Article
A secure elliptic curve based anonymous authentication and key establishment mechanism for IoT and cloud.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 15, p. 22525, doi. 10.1007/s11042-022-14140-z
- By:
- Publication type:
- Article
Elliptic curve cryptography based key management and flexible authentication scheme for 5G wireless networks.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 14, p. 21131, doi. 10.1007/s11042-023-14539-2
- By:
- Publication type:
- Article
A separable and dual data hiding algorithm based on adaptive ternary segmentation coding and ZN-shape space-filling curve.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 14, p. 21205, doi. 10.1007/s11042-022-14032-2
- By:
- Publication type:
- Article
Cryptanalysis and improvement of a semi-fragile watermarking technique for tamper detection and recovery.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 14, p. 22149, doi. 10.1007/s11042-022-13350-9
- By:
- Publication type:
- Article
Secure certificate sharing based on Blockchain framework for online education.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 11, p. 16479, doi. 10.1007/s11042-022-14126-x
- By:
- Publication type:
- Article
A biometrics-based mutual authentication and key agreement protocol for TMIS using elliptic curve cryptography.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 11, p. 16009, doi. 10.1007/s11042-022-14007-3
- By:
- Publication type:
- Article
Security enhancement of the cloud paradigm using a novel optimized crypto mechanism.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 11, p. 15983, doi. 10.1007/s11042-022-13960-3
- By:
- Publication type:
- Article
Enhanced privacy-preserving in student certificate management in blockchain and interplanetary file system.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 8, p. 12595, doi. 10.1007/s11042-022-13915-8
- By:
- Publication type:
- Article
Reversible data hiding in encrypted domain by signal reconstruction.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 1, p. 1203, doi. 10.1007/s11042-022-13266-4
- By:
- Publication type:
- Article
ISC-MTI: An IPFS and smart contract-based framework for machine learning model training and invocation.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 28, p. 40343, doi. 10.1007/s11042-022-13163-w
- By:
- Publication type:
- Article
STEAC: Towards secure, traceable, and efficient cryptographic access control scheme in smart healthcare.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 21, p. 30069, doi. 10.1007/s11042-022-12805-3
- By:
- Publication type:
- Article
Development of GAN-based optimal neural network structure for group synchronization.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 20, p. 28999, doi. 10.1007/s11042-022-12601-z
- By:
- Publication type:
- Article
Multi keyword searchable attribute based encryption for efficient retrieval of health Records in Cloud.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 16, p. 22065, doi. 10.1007/s11042-021-10817-z
- By:
- Publication type:
- Article
Separable reversible data hiding in encrypted images based on Paillier cryptosystem.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 13, p. 18807, doi. 10.1007/s11042-022-12684-8
- By:
- Publication type:
- Article
Dynamic analysis of a novel chaotic system with no linear terms and use for DNA-based image encryption.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 8, p. 10907, doi. 10.1007/s11042-022-12044-6
- By:
- Publication type:
- Article
Session key based novel lightweight image encryption algorithm using a hybrid of Chebyshev chaotic map and crossover.
- Published in:
- Multimedia Tools & Applications, 2021, v. 80, n. 25, p. 33843, doi. 10.1007/s11042-021-11160-z
- By:
- Publication type:
- Article
Authentic secret share creation techniques using visual cryptography with public key encryption.
- Published in:
- Multimedia Tools & Applications, 2021, v. 80, n. 21-23, p. 32023, doi. 10.1007/s11042-021-11202-6
- By:
- Publication type:
- Article
PHYSICAL UNCLONABLE FUNCTION HARDWARE KEYS UTILIZING KIRCHHOFF-LAW-JOHNSON-NOISE SECURE KEY EXCHANGE AND NOISE-BASED LOGIC.
- Published in:
- Fluctuation & Noise Letters, 2013, v. 12, n. 3, p. -1, doi. 10.1142/S0219477513500181
- By:
- Publication type:
- Article
REMARK ON A "NON-BREAKABLE DATA ENCRYPTION" SCHEME BY KISH AND SETHURAMAN.
- Published in:
- Fluctuation & Noise Letters, 2004, v. 4, n. 4, p. C25, doi. 10.1142/S0219477504002324
- By:
- Publication type:
- Article
A heterogeneous signcryption scheme for smart grid with trusted multi-ciphertext equality test.
- Published in:
- Electronic Research Archive, 2023, v. 31, n. 11, p. 1, doi. 10.3934/mbe.2023898
- By:
- Publication type:
- Article
Complex queries over decentralised systems for geodata retrieval.
- Published in:
- IET Networks (Wiley-Blackwell), 2023, v. 12, n. 2, p. 37, doi. 10.1049/ntw2.12037
- By:
- Publication type:
- Article
边缘计算与区块多链下的安全可信认证模型.
- Published in:
- Journal of Frontiers of Computer Science & Technology, 2023, v. 17, n. 3, p. 733, doi. 10.3778/j.issn.1673-9418.2206011
- By:
- Publication type:
- Article
可公开验证无对运算的无证书聚合签密方案.
- Published in:
- Journal of Frontiers of Computer Science & Technology, 2022, v. 16, n. 11, p. 2519, doi. 10.3778/j.issn.1673-9418.2104074
- By:
- Publication type:
- Article
模指数外包方案ExpSOS 的格基密码分析.
- Published in:
- Journal of Frontiers of Computer Science & Technology, 2022, v. 16, n. 5, p. 1087, doi. 10.3778/j.issn.1673-9418.2011052
- By:
- Publication type:
- Article