بدائل البحث:
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
element » elements (توسيع البحث)
update » updated (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
element » elements (توسيع البحث)
update » updated (توسيع البحث)
-
1
Security testing and evaluation of cryptography algorithms. (c2003)
منشور في 2003احصل على النص الكامل
احصل على النص الكامل
masterThesis -
2
-
3
A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group
منشور في 2023"…<p dir="ltr">There is a need of secure and robust encryption algorithm that can be implemented on each and diverse software and hardware platforms. …"
-
4
-
5
-
6
Axes-Based Encryption Key
منشور في 2018احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
7
Scrambled Prime Key Encryption
منشور في 2018"…To enhance data security different cryptographic algorithms are used. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
8
CNN and HEVC Video Coding Features for Static Video Summarization
منشور في 2022احصل على النص الكامل
article -
9
Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment
منشور في 2022الموضوعات: -
10
-
11
-
12
A hybrid cryptosystem based on WEP for 802.11 networks. (c2006)
منشور في 2006احصل على النص الكامل
احصل على النص الكامل
masterThesis -
13
A Novel Encryption Method for Dorsal Hand Vein Images on a Microcomputer
منشور في 2019"…Second, the pre- and post-processed images were encrypted with a new encryption algorithm in the microcomputer environment. …"
-
14
-
15
-
16
-
17
Automatic Video Summarization Using HEVC and CNN Features
منشور في 2022احصل على النص الكامل
doctoralThesis -
18
-
19
Privacy Preserving Cancellable Template Generation for Crypto-Biometric Authentication System
منشور في 2025"…Integrating cryptographic techniques with biometric modality has presented a dual-layered security mechanism, significantly mitigating the risk of biometric data breaches. In this paper, we propose a biometric template preservation scheme that employs minutiae transformation and encryption of biometric features for secure biometric template generation. …"
-
20
A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method
منشور في 2022"…Every communication body wants to secure their data while communicating over the Internet. The internet has various benefits but the main demerit is the privacy and security and the transmission of data over insecure network or channel may happen. …"