Search

Showing total 10,557 results

Search Constraints

Start Over You searched for: Search Limiters Full Text Remove constraint Search Limiters: Full Text Topic cryptography Remove constraint Topic: cryptography Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years
10,557 results

Search Results

1. Some Current Cybersecurity Research in Europe

2. Securing Information Systems in an Uncertain World Enterprise Level Security (Invited Paper)

3. Rethinking blockchain security: Position paper

4. Critical perspectives on provable security: Fifteen years of 'another look' papers

5. REVIEW PAPER ON BITCOIN TECHNOLOGY

7. Recipient Privacy in Online Social Networks (Short Paper)

8. Research on Digital Steganography and Image Synthesis Model Based on Improved Wavelet Neural Network.

9. Guest Editorial: Selected papers from the 24th International Conference on Information Security and Cryptology (ICISC 2021).

10. Survey Paper on Digital Image Sharing by Diverse Image Media

11. Review Paper on Wormhole Attack

12. Lightweight and Optimized Multi-Layer Data Hiding using Video Steganography Paper

13. Invited Paper: Secure Boot and Remote Attestation in the Sanctum Processor

14. The black paper of quantum cryptography: Real implementation problems

15. Parallel Search Using Probabilistic DNA Sticker Model to Cryptanyze One Time Pad Polyalphabetic Cipher.

16. Privacy Preserving Association Rule Mining using Horizontally Partition Data: Review Paper

17. A research Paper on Cryptography Encryption and Compression Techniques

18. Cryptographic Assumptions: A Position Paper

19. Relative Generalized Hamming Weights of One-Point Algebraic Geometric Codes<xref ref-type="fn" rid="fn1">1</xref><fn id="fn1"><label>1</label><p>The paper is registered to the ORCID of Olav Geil. For more details please visit ...

20. Errorless robust JPEG steganography using steganographic polar codes.

22. Guest editorial: selected papers from ICIMCS 2013

23. E-Coin-Based Priced Oblivious Transfer with a Fast Item Retrieval.

24. New Variations of Discrete Logarithm Problem.

25. History, decoded.

26. Machine Learning and Applied Cryptography.

27. Methods and Challenges of Cryptography-Based Privacy-Protection Algorithms for Vehicular Networks.

28. On a class of permutation trinomials over finite fields.

29. Enhancing Security with Multi-level Steganography: A Dynamic Least Significant Bit and Wavelet-Based Approach.

30. Enhancing Smart Communication Security: A Novel Cost Function for Efficient S-Box Generation in Symmetric Key Cryptography.

31. Survey of research on confidential computing.

32. A Secure Architecture to Protect the Network from Replay Attacks during Client-to-Client Data Transmission.

33. Hamming codes for wet paper steganography.

34. DIGITAL CURRENCY: A CONCEPTUAL FRAMEWORK OF PERFORMANCE.

35. Mixture Differential Cryptanalysis on Round-Reduced SIMON32/64 Using Machine Learning.

36. Information Theory, Living Systems, and Communication Engineering.

37. Motion vector‐domain video steganalysis exploiting skipped macroblocks.

38. Secure encryption over the ring F2 + uF2 + vF2 + uvF2.

39. IoT Security for D-App in Supply Chain Management.

40. Reversible Logic Gates and Applications - A Low Power Solution to VLSI Chips.

41. Cryptanalysis of Two Conditional Privacy Preserving Authentication Schemes for Vehicular Ad Hoc Networks.

42. Possibility of land ownership transaction with non-fungible token technology: Minting survey plan.

43. Ethics of Quantum Computing: an Outline.

44. Assessing learning engagement based on facial expression recognition in MOOC’s scenario

45. A CNN-based scheme for COVID-19 detection with emergency services provisions using an optimal path planning

46. Physical-Layer Security, Quantum Key Distribution, and Post-Quantum Cryptography.

47. Development of Security Rules and Mechanisms to Protect Data from Assaults.

48. A large-scale data security detection method based on continuous time graph embedding framework.

49. A Multi-Party Functional Signatures Scheme for Private Blockchain.

50. Enhancing Privacy in the Internet of Vehicles via Hyperelliptic Curve Cryptography.