Loading…
Loading…
Loading…
Structure Aware Visual Cryptography
Liu, Bin, Martin, Ralph R., Huang, Ji-Wu, Hu, Shi-Min
Published in Computer graphics forum (01.10.2014)
Published in Computer graphics forum (01.10.2014)
Get full text
Journal Article
Loading…
Loading…
Combining Cryptography with EEG Biometrics
Damasevicius, Robertas, Maskeliunas, Rytis, Kazanavicius, Egidijus, Wozniak, Marcin
Published in Computational intelligence and neuroscience (01.01.2018)
Published in Computational intelligence and neuroscience (01.01.2018)
Get full text
Journal Article
Loading…
Design of Quantum Communication Protocols in Quantum Cryptography
Alhayani, Bilal A., AlKawak, Omar A., Mahajan, Hemant B., Ilhan, Haci, Qasem, Roa’a Mohammed
Published in Wireless personal communications (18.07.2023)
Published in Wireless personal communications (18.07.2023)
Get full text
Journal Article
Loading…
Loading…
Loading…
Implementation and practical problems of chaos-based cryptography revisited
Teh, Je Sen, Alawida, Moatsum, Sii, You Cheng
Published in Journal of information security and applications (01.02.2020)
Published in Journal of information security and applications (01.02.2020)
Get full text
Journal Article
Loading…
Loading…
Geospatial cryptography: enabling researchers to access private, spatially referenced, human subjects data for cancer control and prevention
Jacquez, Geoffrey M., Essex, Aleksander, Curtis, Andrew, Kohler, Betsy, Sherman, Recinda, El Emam, Khaled, Shi, Chen, Kaufmann, Andy, Beale, Linda, Cusick, Thomas, Goldberg, Daniel, Goovaerts, Pierre
Published in Journal of geographical systems (01.07.2017)
Published in Journal of geographical systems (01.07.2017)
Get full text
Journal Article
Loading…
Leakage-resilient identity-based cryptography from minimal assumptions
Zhou, Yanwei, Yang, Bo, Qiao, Zirui, Xia, Zhe, Zhang, Mingwu, Mu, Yi
Published in Designs, codes, and cryptography (01.11.2023)
Published in Designs, codes, and cryptography (01.11.2023)
Get full text
Journal Article
Loading…
Loading…
Gameful Introduction to Cryptography for Dyslexic Students
Rahartomo, Argianto, Kaur, Harpreet, Ghafari, Mohammad
Published in Proceedings / Conference on Software Engineering Education & Training (29.07.2024)
Published in Proceedings / Conference on Software Engineering Education & Training (29.07.2024)
Get full text
Conference Proceeding
Loading…
Loading…
FPGA Realization of a Reversible Data Hiding Scheme for 5G MIMO-OFDM System by Chaotic Key Generation-Based Paillier Cryptography Along with LDPC and Its Side Channel Estimation Using Machine Learning Technique
Shajin, Francis H., Rajesh, P.
Published in Journal of circuits, systems, and computers (30.03.2022)
Published in Journal of circuits, systems, and computers (30.03.2022)
Get full text
Journal Article
Loading…
Cryptography and Its Applications in Information Security
Year of Publication 2022
Get full text
eBook
Loading…
Securing the future: exploring post-quantum cryptography for authentication and user privacy in IoT devices
Mansoor, Khwaja, Afzal, Mehreen, Iqbal, Waseem, Abbas, Yawar
Published in Cluster computing (01.04.2025)
Published in Cluster computing (01.04.2025)
Get full text
Journal Article