Search

Showing total 728 results
728 results

Search Results

1. Evaluating the merits and constraints of cryptography-steganography fusion: a systematic analysis.

3. Ensuring Secure and Tamper Resistant Election with Blockchain Powered Online Voting.

4. Parallel Search Using Probabilistic DNA Sticker Model to Cryptanyze One Time Pad Polyalphabetic Cipher.

5. AUDIO ENCRYPTION AND DECRYPTION USING AES ALGORITHM TECHNIQUE.

6. Errorless robust JPEG steganography using steganographic polar codes.

7. Adventures in Cryptology: Exploration-Worthy Project Topics.

8. AN EFFICIENT ALGORITHM FOR INTEGER LATTICE REDUCTION.

9. E-Coin-Based Priced Oblivious Transfer with a Fast Item Retrieval.

10. BLE-based secure tracking system proposal.

11. Methods and Challenges of Cryptography-Based Privacy-Protection Algorithms for Vehicular Networks.

12. On a class of permutation trinomials over finite fields.

13. Enhancing Security with Multi-level Steganography: A Dynamic Least Significant Bit and Wavelet-Based Approach.

14. Comparative analysis between a pixel-wise image encryption scheme and AES in a web application context.

15. Enhancing Smart Communication Security: A Novel Cost Function for Efficient S-Box Generation in Symmetric Key Cryptography.

16. Survey of research on confidential computing.

17. A Post-Quantum Cross-Domain Authentication Scheme Based on Multi-Chain Architecture.

18. Introduction to the Special Issue: Resources for Undergraduate Cryptology.

19. An Innovative Approach Using TKN-Cryptology for Identifying the Replay Assault.

20. Mixture Differential Cryptanalysis on Round-Reduced SIMON32/64 Using Machine Learning.

21. Information Theory, Living Systems, and Communication Engineering.

22. Motion vector‐domain video steganalysis exploiting skipped macroblocks.

23. Secure encryption over the ring F2 + uF2 + vF2 + uvF2.

24. DieRoll: A Unique Key Generation and Encryption Technique.

25. Modified Symmetric Image Encryption Approach Based on Mixed Column and Substitution Box.

26. IoT Security for D-App in Supply Chain Management.

27. Reversible Logic Gates and Applications - A Low Power Solution to VLSI Chips.

28. Cryptanalysis of Two Conditional Privacy Preserving Authentication Schemes for Vehicular Ad Hoc Networks.

29. Possibility of land ownership transaction with non-fungible token technology: Minting survey plan.

30. Distributed Computing for Emerging Smart Networks : 4th International Workshop, DiCES-N 2023, Bizerte, Tunisia, May 27, 2023, Revised Selected Papers

31. Selected Areas in Cryptography – SAC 2023 : 30th International Conference, Fredericton, Canada, August 14–18, 2023, Revised Selected Papers

32. Computer Security. ESORICS 2023 International Workshops : CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25–29, 2023, Revised Selected Papers, Part II

33. Blockchain Technology and Application : 6th CCF China Blockchain Summit, CBCS 2023, Haikou, China, December 15–18, 2023, Revised Selected Papers

34. Information Security and Cryptology : 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9–10, 2023, Revised Selected Papers, Part II

35. Selected Areas in Cryptography : 29th International Conference, SAC 2022, Windsor, ON, Canada, August 24–26, 2022, Revised Selected Papers

36. Computer Security. ESORICS 2023 International Workshops : CyberICS, DPM, CBT, and SECPRE, The Hague, The Netherlands, September 25–29, 2023, Revised Selected Papers, Part I

40. Enhancing Privacy in the Internet of Vehicles via Hyperelliptic Curve Cryptography.

41. Student Voting on ICP Blockchain: A Decentralized Web3 Approach-An Infrastructure Protection System.

42. Minoan Cryptanalysis: Computational Approaches to Deciphering Linear A and Assessing Its Connections with Language Families from the Mediterranean and the Black Sea Areas.

43. Lattice-Based Threshold Secret Sharing Scheme and Its Applications: A Survey.

44. Secure Smart Contract Based on Blockchain to Prevent the Non-Repudiation Phenomenon.

45. An In-Depth Analysis of Steganography Techniques: From Classical Edge Detection to Adaptive Approaches.

46. Research on the Type Synthesis of a Regular Hexagonal Prism Rubik's Cube Mechanism.

47. Data Security Architecture in Cloud Computing based on Elliptic Curve Cryptography with Special Focus on Lowering the Cipher Space.

48. Efficient post-quantum secure deterministic wallet scheme.

49. Tightly-Secure Two-Tier Signatures on Code-Based Digital Signatures with Chameleon Hash Functions.

50. Reversible codes in the Rosenbloom-Tsfasman metric.