Search

Showing total 16,446 results
16,446 results

Search Results

1. Evaluating the merits and constraints of cryptography-steganography fusion: a systematic analysis.

2. Secret Paper with Vinegar as an Invisible Security Ink and Fire as a Decryption Key for Information Protection.

3. Securing Information Systems in an Uncertain World Enterprise Level Security (Invited Paper)

5. Ensuring Secure and Tamper Resistant Election with Blockchain Powered Online Voting.

6. Research on Digital Steganography and Image Synthesis Model Based on Improved Wavelet Neural Network.

7. Guest Editorial: Selected papers from the 24th International Conference on Information Security and Cryptology (ICISC 2021).

8. Secret Writing on Dirty Paper: A Deterministic View.

9. Parallel Search Using Probabilistic DNA Sticker Model to Cryptanyze One Time Pad Polyalphabetic Cipher.

10. From Text to Technological Context: Medieval Arabic Cryptology's Relation to Paper, Numbers, and the Post.

12. Improving the Embedding Efficiency of Wet Paper Codes by Paper Folding.

14. Efficiency of LSB steganography on medical information.

16. Writing on wet paper.

17. Relative Generalized Hamming Weights of One-Point Algebraic Geometric Codes<xref ref-type="fn" rid="fn1">1</xref><fn id="fn1"><label>1</label><p>The paper is registered to the ORCID of Olav Geil. For more details please visit ...

18. AUDIO ENCRYPTION AND DECRYPTION USING AES ALGORITHM TECHNIQUE.

20. Errorless robust JPEG steganography using steganographic polar codes.

22. 2DOTS-multi-bit-encoding for robust and imperceptible image watermarking.

24. Adventures in Cryptology: Exploration-Worthy Project Topics.

25. AN EFFICIENT ALGORITHM FOR INTEGER LATTICE REDUCTION.

26. E-Coin-Based Priced Oblivious Transfer with a Fast Item Retrieval.

27. Review Paper on Data Hiding In 3D Barcode Image Using Steganography.

28. An examination of Some Commonly Utilized Techniques for Perception of Secret Writing.

29. New Variations of Discrete Logarithm Problem.

30. Machine Learning and Applied Cryptography.

31. BLE-based secure tracking system proposal.

32. Methods and Challenges of Cryptography-Based Privacy-Protection Algorithms for Vehicular Networks.

33. On a class of permutation trinomials over finite fields.

34. Enhancing Security with Multi-level Steganography: A Dynamic Least Significant Bit and Wavelet-Based Approach.

35. Comparative analysis between a pixel-wise image encryption scheme and AES in a web application context.

36. Enhancing Smart Communication Security: A Novel Cost Function for Efficient S-Box Generation in Symmetric Key Cryptography.

37. Survey of research on confidential computing.

38. A Secure Architecture to Protect the Network from Replay Attacks during Client-to-Client Data Transmission.

39. A Post-Quantum Cross-Domain Authentication Scheme Based on Multi-Chain Architecture.

40. Introduction to the Special Issue: Resources for Undergraduate Cryptology.

41. An Innovative Approach Using TKN-Cryptology for Identifying the Replay Assault.

42. SECURITY FEATURES ON AND WITH DOCUMENTS: A SURVEY.

43. Hamming codes for wet paper steganography.

44. Fast edge integration based active contours for color images

45. Wet paper codes with improved embedding efficiency.

46. An Efficient Technique to Prevent Data Misuse with Matrix Cipher Encryption Algorithms.

47. A STUDY AND COMPARISON OF THE VARIOUS CRYPTOGRAPHY TECHNIQUE STANDARDS WITHIN FIFTEEN FACTORS.

49. Call for papers: 2017 Symposium on Cryptologic History.

50. DIGITAL CURRENCY: A CONCEPTUAL FRAMEWORK OF PERFORMANCE.