Search

Showing total 7,115 results
7,115 results

Search Results

1. Securing Information Systems in an Uncertain World Enterprise Level Security (Invited Paper)

2. Rethinking blockchain security: Position paper

3. Research on Digital Steganography and Image Synthesis Model Based on Improved Wavelet Neural Network.

4. Guest Editorial: Selected papers from the 24th International Conference on Information Security and Cryptology (ICISC 2021).

5. Invited Paper: Secure Boot and Remote Attestation in the Sanctum Processor

6. Parallel Search Using Probabilistic DNA Sticker Model to Cryptanyze One Time Pad Polyalphabetic Cipher.

7. Relative Generalized Hamming Weights of One-Point Algebraic Geometric Codes<xref ref-type="fn" rid="fn1">1</xref><fn id="fn1"><label>1</label><p>The paper is registered to the ORCID of Olav Geil. For more details please visit ...

8. Errorless robust JPEG steganography using steganographic polar codes.

10. E-Coin-Based Priced Oblivious Transfer with a Fast Item Retrieval.

11. New Variations of Discrete Logarithm Problem.

12. History, decoded.

13. Machine Learning and Applied Cryptography.

14. Methods and Challenges of Cryptography-Based Privacy-Protection Algorithms for Vehicular Networks.

15. On a class of permutation trinomials over finite fields.

16. Enhancing Security with Multi-level Steganography: A Dynamic Least Significant Bit and Wavelet-Based Approach.

17. Enhancing Smart Communication Security: A Novel Cost Function for Efficient S-Box Generation in Symmetric Key Cryptography.

18. Survey of research on confidential computing.

19. A Secure Architecture to Protect the Network from Replay Attacks during Client-to-Client Data Transmission.

20. Hamming codes for wet paper steganography.

21. DIGITAL CURRENCY: A CONCEPTUAL FRAMEWORK OF PERFORMANCE.

22. Mixture Differential Cryptanalysis on Round-Reduced SIMON32/64 Using Machine Learning.

23. Information Theory, Living Systems, and Communication Engineering.

24. Motion vector‐domain video steganalysis exploiting skipped macroblocks.

25. Secure encryption over the ring F2 + uF2 + vF2 + uvF2.

26. IoT Security for D-App in Supply Chain Management.

27. Reversible Logic Gates and Applications - A Low Power Solution to VLSI Chips.

28. Cryptanalysis of Two Conditional Privacy Preserving Authentication Schemes for Vehicular Ad Hoc Networks.

29. Possibility of land ownership transaction with non-fungible token technology: Minting survey plan.

30. Ethics of Quantum Computing: an Outline.

31. Assessing learning engagement based on facial expression recognition in MOOC’s scenario

32. Physical-Layer Security, Quantum Key Distribution, and Post-Quantum Cryptography.

33. Development of Security Rules and Mechanisms to Protect Data from Assaults.

34. A large-scale data security detection method based on continuous time graph embedding framework.

35. A Multi-Party Functional Signatures Scheme for Private Blockchain.

36. Enhancing Privacy in the Internet of Vehicles via Hyperelliptic Curve Cryptography.

37. Minoan Cryptanalysis: Computational Approaches to Deciphering Linear A and Assessing Its Connections with Language Families from the Mediterranean and the Black Sea Areas.

38. Lattice-Based Threshold Secret Sharing Scheme and Its Applications: A Survey.

39. Secure Smart Contract Based on Blockchain to Prevent the Non-Repudiation Phenomenon.

40. Research on the Type Synthesis of a Regular Hexagonal Prism Rubik's Cube Mechanism.

41. Two-Layer Security Algorithms to Prevent Attacks on Data in Cyberspace.

42. Efficient post-quantum secure deterministic wallet scheme.

43. Tightly-Secure Two-Tier Signatures on Code-Based Digital Signatures with Chameleon Hash Functions.

44. Reversible codes in the Rosenbloom-Tsfasman metric.

45. A new semiring and its cryptographic applications.

46. Algebraic properties of the maps χn.

47. Preimage attacks on reduced-round Ascon-Xof.

48. Text steganography by changing the black color.

49. High Embedding Capacity Color Image Steganography Scheme Using Pixel Value Differencing and Addressing the Falling-Off Boundary Problem.

50. A Secure Protocol Authentication Method Based on the Strand Space Model for Blockchain-Based Industrial Internet of Things.