14 results on '"Cryptograph"'
Search Results
2. Novel and secure encoding and hiding techniques using image steganography: A survey.
3. A Persistent Conversation Protocol Supporting Anonymity and Security.
4. Pym and Unreadability
5. Mutual-Authentication Mechanism for RFID Systems.
6. A standard cell-based leakage power analysis attack countermeasure using symmetric dual-rail logic.
7. A mixed scrambling operation for hiding image.
8. Secure Identity-Based Blind Signature Scheme in the Standard Model.
9. Factoring based proxy signature schemes
10. Improved authenticated multiple-key agreement protocol without using conventional one-way function
11. Des Triple Algorithm in Security Office Data Security Mayor Pematangsiantar: Des Triple Algorithm in Security Office Data Security Mayor Pematangsiantar
12. Construction of 2-designs.
13. Design of peer-to-peer protocol with sensible and secure IoT communication for future internet architecture.
14. Data Security and access management in Cloud Computing: capability list-based cryptography
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.