encryption

Explore academic connections and research related to this keyword

422
Views
8
Total Connections

Related Articles & Bibliographies

1
Securing Fingerprint Template Using Blockchain and Distributed Storage System
Moses Arhinful Acquah;Na Chen;Jeng-Shyang Pan;Hong-Mei Yang;Bin Yan;Acquah, Moses Arhinful;Chen, N...
2020 Symmetry DOI: 10.3390/sym12060951 297 views
2
Joint Image Compression and Encryption Using IWT with SPIHT, Kd-Tree and Chaotic Maps
Nasrullah;Jun Sang;Muhammad Azeem Akbar;Bin Cai;Hong Xiang;Haibo Hu;Nasrullah,;Sang, Jun;Akbar, Muha...
2018 applied sciences DOI: 10.3390/app8101963 146 views
3
parametric comparison of emds algorithm with some symmetric cryptosystems
;Mani Arora;Sandeep Sharma;Derick Engles
2017 restorative neurology and neuroscience DOI: 10.1016/j.eij.2016.1... 230 views
4
study on company security policies from digital media
;CRISTINA-MARIA RĂDULESCU
2015 kastamonu eğitim dergisi 287 views
5
load balancing dinamis menggunakan algoritma dynamic distribution upon demand pada sistem enkripsi/dekripsi data terdistribusi
;Lauw Reduardy I. Laulyta;Mohammad Fajar;Syamsul Bahri
2015 Health technology assessment (Winchester, England) 143 views

Related Journals

ACS applied materials & interfaces
ISSN: 1944-8244 2,162 views
Nature communications
ISSN: 2041-1723 1,318 views
Optics express
ISSN: 1094-4087 704 views

Related Research Groups

No Research Groups Found

No research groups are currently associated with this keyword.