Search

Showing total 16,959 results

Search Constraints

Start Over You searched for: Search Limiters Peer Reviewed Remove constraint Search Limiters: Peer Reviewed Topic cryptography Remove constraint Topic: cryptography Language english Remove constraint Language: english
16,959 results

Search Results

1. Evaluating the merits and constraints of cryptography-steganography fusion: a systematic analysis.

2. Secret Paper with Vinegar as an Invisible Security Ink and Fire as a Decryption Key for Information Protection.

3. Securing Information Systems in an Uncertain World Enterprise Level Security (Invited Paper)

5. Research on Digital Steganography and Image Synthesis Model Based on Improved Wavelet Neural Network.

6. Ensuring Secure and Tamper Resistant Election with Blockchain Powered Online Voting.

7. Guest Editorial: Selected papers from the 24th International Conference on Information Security and Cryptology (ICISC 2021).

8. Secret Writing on Dirty Paper: A Deterministic View.

9. From Text to Technological Context: Medieval Arabic Cryptology's Relation to Paper, Numbers, and the Post.

11. Improving the Embedding Efficiency of Wet Paper Codes by Paper Folding.

13. Writing on wet paper.

14. Efficiency of LSB steganography on medical information.

15. Parallel Search Using Probabilistic DNA Sticker Model to Cryptanyze One Time Pad Polyalphabetic Cipher.

18. Relative Generalized Hamming Weights of One-Point Algebraic Geometric Codes<xref ref-type="fn" rid="fn1">1</xref><fn id="fn1"><label>1</label><p>The paper is registered to the ORCID of Olav Geil. For more details please visit ...

19. A Linked List Encryption Scheme for Image Steganography without Embedding.

20. Security Features on and with Documents: A Survey.

21. A Survey on Emerging Blockchain Technology Platforms for Securing the Internet of Things.

22. 2DOTS-multi-bit-encoding for robust and imperceptible image watermarking.

24. AUDIO ENCRYPTION AND DECRYPTION USING AES ALGORITHM TECHNIQUE.

25. Errorless robust JPEG steganography using steganographic polar codes.

26. Review Paper on Data Hiding In 3D Barcode Image Using Steganography.

27. An examination of Some Commonly Utilized Techniques for Perception of Secret Writing.

28. AN EFFICIENT ALGORITHM FOR INTEGER LATTICE REDUCTION.

29. Adventures in Cryptology: Exploration-Worthy Project Topics.

30. New Variations of Discrete Logarithm Problem.

31. Efficient and secure data transmission: cryptography techniques using ECC.

32. Image steganography without embedding by carrier secret information for secure communication in networks.

33. Power Consumption Efficiency of Encryption Schemes for RFID.

34. An Improved Image Steganography Security and Capacity Using Ant Colony Algorithm Optimization.

35. BLE-based secure tracking system proposal.

36. Enhancing Industrial Robot Arms Data Security with a Hybrid Encryption Approach.

37. Machine Learning and Applied Cryptography.

38. A Secure Architecture to Protect the Network from Replay Attacks during Client-to-Client Data Transmission.

39. E-Coin-Based Priced Oblivious Transfer with a Fast Item Retrieval.

40. Compressed sensing based visually secure multi-secret image encryption-sharing scheme.

41. Security in internet of things: a review on approaches based on blockchain, machine learning, cryptography, and quantum computing.

42. A Post-Quantum Cross-Domain Authentication Scheme Based on Multi-Chain Architecture.

43. Hamming codes for wet paper steganography.

44. Fast edge integration based active contours for color images

45. Wet paper codes with improved embedding efficiency.

46. An Efficient Technique to Prevent Data Misuse with Matrix Cipher Encryption Algorithms.

48. A STUDY AND COMPARISON OF THE VARIOUS CRYPTOGRAPHY TECHNIQUE STANDARDS WITHIN FIFTEEN FACTORS.

49. Privacy preserving mining of Association Rules on horizontally and vertically partitioned data: A review paper.

50. Methods and Challenges of Cryptography-Based Privacy-Protection Algorithms for Vehicular Networks.