Search alternatives:
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
element » elements (Expand Search)
update » updated (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
element » elements (Expand Search)
update » updated (Expand Search)
-
1
Security testing and evaluation of cryptography algorithms. (c2003)
Published 2003Get full text
Get full text
masterThesis -
2
-
3
A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group
Published 2023“…<p dir="ltr">There is a need of secure and robust encryption algorithm that can be implemented on each and diverse software and hardware platforms. …”
-
4
-
5
Hardening the ElGamal cryptosystem in the setting of the second group of units. (c2011)
Published 2011Get full text
Get full text
masterThesis -
6
Axes-Based Encryption Key
Published 2018Get full text
Get full text
Get full text
Get full text
conferenceObject -
7
Scrambled Prime Key Encryption
Published 2018“…To enhance data security different cryptographic algorithms are used. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
8
CNN and HEVC Video Coding Features for Static Video Summarization
Published 2022Get full text
article -
9
Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment
Published 2022Subjects: -
10
-
11
-
12
A hybrid cryptosystem based on WEP for 802.11 networks. (c2006)
Published 2006Get full text
Get full text
masterThesis -
13
A Novel Encryption Method for Dorsal Hand Vein Images on a Microcomputer
Published 2019“…Second, the pre- and post-processed images were encrypted with a new encryption algorithm in the microcomputer environment. …”
-
14
-
15
-
16
-
17
Automatic Video Summarization Using HEVC and CNN Features
Published 2022Get full text
doctoralThesis -
18
-
19
Privacy Preserving Cancellable Template Generation for Crypto-Biometric Authentication System
Published 2025“…Integrating cryptographic techniques with biometric modality has presented a dual-layered security mechanism, significantly mitigating the risk of biometric data breaches. In this paper, we propose a biometric template preservation scheme that employs minutiae transformation and encryption of biometric features for secure biometric template generation. …”
-
20
A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method
Published 2022“…Every communication body wants to secure their data while communicating over the Internet. The internet has various benefits but the main demerit is the privacy and security and the transmission of data over insecure network or channel may happen. …”