Search

Showing total 3,425 results
3,425 results

Search Results

1. Evaluating the merits and constraints of cryptography-steganography fusion: a systematic analysis.

2. Security in Computer and Information Sciences. Second International Symposium, EuroCybersec 2021, Nice, France, October 25-26, 2021, Revised Selected Papers.

3. Errorless robust JPEG steganography using steganographic polar codes.

4. 2DOTS-multi-bit-encoding for robust and imperceptible image watermarking.

5. BLE-based secure tracking system proposal.

6. Comparative analysis between a pixel-wise image encryption scheme and AES in a web application context.

7. Hamming codes for wet paper steganography.

8. A review on image steganographic techniques based on optimization algorithms for secret communication.

9. Ethics of Quantum Computing: an Outline.

10. Enhancing Data Security of Cloud Based LMS.

11. Research on the optimization of communication protocol in network security protocol.

12. A large-scale data security detection method based on continuous time graph embedding framework.

13. Efficient post-quantum secure deterministic wallet scheme.

14. An efficient privacy-preserving recommender system in wireless networks.

15. Algebraic properties of the maps χn.

16. Preimage attacks on reduced-round Ascon-Xof.

17. Development and analysis of attack-resilient three party authenticated key agreement scheme based on chaotic maps for secure communication.

18. Link-based penalized trust management scheme for preemptive measures to secure the edge-based internet of things networks.

19. An edge computing oriented unified cryptographic key management service for financial context.

20. Improved homomorphic evaluation for hash function based on TFHE.

21. Combining MILP modeling with algebraic bias evaluation for linear mask search: improved fast correlation attacks on SNOW.

22. A variant of Boneh-Franklin IBE with a tight reduction in the random oracle model.

23. Genetic algorithm and hamilton path based data hiding scheme including embedding cost optimization.

24. Power Allocation under Given Secret Key Generation Rate for Secure Wireless OFDM Systems.

25. A Review on Blockchain and IoT Integration from Energy, Security and Hardware Perspectives.

26. Preface: Special Issue on Card-Based Cryptography.

27. Mobi-Sense: mobility-aware sensor-fog paradigm for mission-critical applications using network coding and steganography.

28. Weak rotational property and its application.

29. Two modifications for Loidreau's code-based cryptosystem.

30. Meet-in-the-middle attacks on AES with value constraints.

32. Quantum implementation of SHA1 and MD5 and comparison with classical algorithms.

33. The state diagram of χ.

34. Securing edge computing using cryptographic schemes: a review.

35. Concrete quantum cryptanalysis of binary elliptic curves via addition chain.

36. Cryptanalysis and improvement of efficient multiparty quantum secret sharing based on a novel structure and single qubits.

37. PPSecS: Privacy-Preserving Secure Big Data Storage in a Cloud Environment.

38. Comparative Study of Block Ciphers Implementation for Resource-Constrained Devices (Review).

39. Introducing nega-Forrelation: quantum algorithms in analyzing nega-Hadamard and nega-crosscorrelation spectra.

40. Exploiting ROLLO's constant-time implementations with a single-trace analysis.

41. An image steganography scheme based on ResNet.

42. A novel block encryption method based on Catalan random walks.

43. Directional modulation techniques for secure wireless communication: a comprehensive survey.

44. Simple method of selecting totalistic rules for pseudorandom number generator based on nonuniform cellular automaton.

46. Image steganalysis based on attention augmented convolution.

47. Security-oriented steganographic payload allocation for multi-remote sensing images.

48. Compressed sensing based visually secure multi-secret image encryption-sharing scheme.

49. Security in internet of things: a review on approaches based on blockchain, machine learning, cryptography, and quantum computing.

50. Quantum-resistant public-key encryption and signature schemes with smaller key sizes.