encryption

Explore academic connections and research related to this keyword

389
Views
8
Total Connections

Related Articles & Bibliographies

1
Securing Fingerprint Template Using Blockchain and Distributed Storage System
Moses Arhinful Acquah;Na Chen;Jeng-Shyang Pan;Hong-Mei Yang;Bin Yan;Acquah, Moses Arhinful;Chen, N...
2020 Symmetry DOI: 10.3390/sym12060951 287 views
2
Joint Image Compression and Encryption Using IWT with SPIHT, Kd-Tree and Chaotic Maps
Nasrullah;Jun Sang;Muhammad Azeem Akbar;Bin Cai;Hong Xiang;Haibo Hu;Nasrullah,;Sang, Jun;Akbar, Muha...
2018 applied sciences DOI: 10.3390/app8101963 138 views
3
parametric comparison of emds algorithm with some symmetric cryptosystems
;Mani Arora;Sandeep Sharma;Derick Engles
2017 restorative neurology and neuroscience DOI: 10.1016/j.eij.2016.1... 222 views
4
study on company security policies from digital media
;CRISTINA-MARIA RĂDULESCU
2015 kastamonu eÄŸitim dergisi 275 views
5
load balancing dinamis menggunakan algoritma dynamic distribution upon demand pada sistem enkripsi/dekripsi data terdistribusi
;Lauw Reduardy I. Laulyta;Mohammad Fajar;Syamsul Bahri
2015 Health technology assessment (Winchester, England) 133 views

Related Journals

ACS applied materials & interfaces
ISSN: 1944-8244 1,284 views
Nature communications
ISSN: 2041-1723 1,144 views
Optics express
ISSN: 1094-4087 594 views

Related Research Groups

No Research Groups Found

No research groups are currently associated with this keyword.