Search

Your search keyword '"Cryptograph"' showing total 41 results

Search Constraints

Start Over You searched for: Descriptor "Cryptograph" Remove constraint Descriptor: "Cryptograph"
41 results on '"Cryptograph"'

Search Results

1. Harnessing Advanced Techniques for Image Steganography: Sequential and Random Encoding with Deep Learning Detection

3. On the universality and isotopy-isomorphy of (r, s, t)-inverse quasigroups and loops with applications to cryptography.

4. الكتابات القبطية المعماة (المنهج والتطبيق)

7. IMPLEMENTASI TEKNIK KRIPTOGRAFI RSA UNTUK PENGAMANAN DATA PENGIRIMAN SMS

8. On McEliece-Type Cryptosystems Using Self-Dual Codes With Large Minimum Weight

10. Baby Careware: A Online Secured Health Consultant

11. Research on Secure Multi-party Computational Geometry

12. Mutual-Authentication Mechanism for RFID Systems

13. Novel and secure encoding and hiding techniques using image steganography: A survey.

16. A standard cell-based leakage power analysis attack countermeasure using symmetric dual-rail logic.

17. A mixed scrambling operation for hiding image.

18. Secure Identity-Based Blind Signature Scheme in the Standard Model.

19. Factoring based proxy signature schemes

20. Improved authenticated multiple-key agreement protocol without using conventional one-way function

21. Des Triple Algorithm in Security Office Data Security Mayor Pematangsiantar: Des Triple Algorithm in Security Office Data Security Mayor Pematangsiantar

22. Mobile Banking Authentication Based on Cryptographically Secured Iris Biometrics

23. Construction of 2-designs.

24. Design of peer-to-peer protocol with sensible and secure IoT communication for future internet architecture.

25. Bitcoin, παραστατικό χρήμα και αποκρατικοποίηση του χρήματος

26. Data Security and access management in Cloud Computing: capability list-based cryptography

27. Short Paper: 'A peer to peer security protocol for the internet of things': Secure communication for the sensiblethings platform

28. Statistical detection of hidden information in natural images

29. A Peer to Peer Security Protocol for the Internet of Things : Secure Communication for the SensibleThings Platform

30. A structure preserving approach for securing XML documents

31. Ochrana osobních údajů v informačním systému

32. Postranní kanály v kryptografii

33. Ochrana osobních údajů v informačním systému

34. Postranní kanály v kryptografii

35. Postranní kanály v kryptografii

36. Ochrana osobních údajů v informačním systému

37. Ochrana osobních údajů v informačním systému

38. Postranní kanály v kryptografii

39. Ochrana osobních údajů v informačním systému

40. Ochrana osobních údajů v informačním systému

41. Postranní kanály v kryptografii

Catalog

Books, media, physical & digital resources