Search

Showing total 49,940 results

Search Constraints

Start Over You searched for: Search Limiters Peer Reviewed Remove constraint Search Limiters: Peer Reviewed Topic cryptography Remove constraint Topic: cryptography
49,940 results

Search Results

1. Taxonomy of Image Encryption Techniques - A Survey

2. A Heterogeneous Computing Framework for Accelerating Fully Homomorphic Encryption

3. Optimizing the Security and Privacy of Cloud Data Communication; Hybridizing Cryptography and Steganography Using Triple Key of AES, RSA and LSB with Deceptive QR Code Technique: A Novel Approach

4. CryptStego: Powerful Blend of Cryptography and Steganography for Securing Communications

5. Patient-Centric Health Data Sovereignty: An Approach Using Proxy Re-Encryption

6. Comparative Analysis of Quantum Key Distribution Protocols: Security, Efficiency, and Practicality

7. Qualitative and Quantitative Analysis of Modifications in Playfair Cipher

9. Empowering Secure and Authenticated Multi-WSN Communication Through a Hybrid Blockchain Framework

10. FPGA Implementation of Biological Feature Based Steganography Method

13. Explaining the Use of Cryptographic API in Android Malware

15. SDN-Based Cryptographic Client Authentication: A New Approach to DHCP Starvation Mitigation

16. EyeEncrypt: A Cyber-Secured Framework for Retinal Image Segmentation

18. Reduction-Free Multiplication for Finite Fields and Polynomial Rings

19. Homomorphic Encryption Schemes Using Nested Matrices

21. Robustness of Affine and Extended Affine Equivalent Surjective S-Box(es) Against Differential Cryptanalysis

24. Virtual Police Station System with Chat Bot Using FSM

26. UC Analysis of the Randomized McEliece Cryptosystem

27. A Lightweight Algorithm to Protect the Web of Things in IOT

28. Privacy-Preserving Cluster Validity

29. A Secure and Efficient Cloud-Connected Body Sensor Network Platform

31. Image Encryption Using RABIN and Elliptic Curve Crypto Systems

32. Authenticated Multi-proxy Accumulation Schemes for Delegated Membership Proofs

33. A Light-Weight Stream Ciphering Model Based on Chebyshev Chaotic Maps and One Dimensional Logistic

35. Quantum Key Distribution: An Ascendable Mechanism for Cryptographic Key Distribution

36. Enhanced Privacy Protection in Blockchain Using SGX and Sidechains

39. An Efficient Lightweight Cryptographic Algorithm for IoT Security

40. RC4D: A New Development of RC4 Encryption Algorithm

41. Hardware-Accelerated Cryptography for Software-Defined Networks with P4

44. An Image Encryption Method Using Chaos and DNA Encoding

47. CBCT: CryptoCurrency Based Blockchain Technology

48. Green Computing: A Contribution Towards Better Future

49. Braille Based Steganography System Using Dynamic Key Exchange

50. Pipelined Implementation of Millar-Rabin Primality Tester Using Altera FPGA Kit