Home
Statistics
Journals
How It Works
Login
Register
Keyword Connections
-
cryptography
Keywords
Connection Type
Connection
Journals
Scientific reports
ieee transactions on image processing : a publication of the ieee signal processing society
Sensors (Basel, Switzerland)
Journal of medical Internet research
optics letters
Biomaterials science
ieee transactions on cybernetics
computer methods and programs in biomedicine
Optics express
acs synthetic biology
big data
international journal of neural systems
healthcare technology letters
Research Groups
No Research Group Connected
Bibliographies
[1]
Computationally efficient mutual authentication protocol for remote infant incubator monitoring system.
[2]
Photothermal-modulated reversible volume transition of wireless hydrogels embedded with redox-responsive carbon dots.
[3]
Energy-efficiency of Cardiomyocyte Stimulation with Rectangular Pulses.
[4]
Cryptographic Considerations for Automation and SCADA Systems Using Trusted Platform Modules.
[5]
Securing Cryptographic Chips against Scan-Based Attacks in Wireless Sensor Network Applications.
[6]
A Survey of Security Services, Attacks, and Applications for Vehicular Ad Hoc Networks (VANETs).
[7]
Fake News: A Technological Approach to Proving the Origins of Content, Using Blockchains.
[8]
A Survey of Security Services, Attacks, and Applications for Vehicular Ad Hoc Networks (VANETs)
[9]
A Blockchain-Based Authentication and Dynamic Group Key Agreement Protocol
[10]
information security in data exchange between mobile devices with android system using rsa encryption
[11]
cryptography in the cloud computing: the current state and logical tasks
[12]
editorial: platforms and ecosystems (september 2017)
[13]
Securing the Exchange of Synthetic Genetic Constructs Using Digital Signatures.
[14]
Scan-Chain-Fault Diagnosis Using Regressions in Cryptographic Chips for Wireless Sensor Networks.
[15]
combined side channel attacks: breaking comp128
[16]
distributed one time password infrastructure for linux environments
[17]
computational and energy costs of cryptographic algorithms on handheld devices
[18]
biometry, the safe key
[19]
Privacy-Preserving Deep Neural Network Methods: Computational and Perceptual Methods—An Overview
[20]
Steganography and cryptography for user data in calendars
[21]
Multilevel data concealing technique using steganography and visual cryptography
[22]
A fair electronic payment system for digital content using elliptic curve cryptography
[23]
FPGA Implementation of a Quantum Cryptography Algorithm
[24]
Improving the Visual Quality of Size-Invariant Visual Cryptography for Grayscale Images: An Analysis-by-Synthesis (AbS) Approach.
[25]
A copyright protection scheme for digital images based on shuffled singular value decomposition and visual cryptography.
[26]
Image size invariant visual cryptography for general access structures subject to display quality constraints.
[27]
Two-out-of-two color matching based visual cryptography schemes.
[28]
Comment on "Cheating prevention in visual cryptography".
[29]
Fourier-based automatic alignment for improved Visual Cryptography schemes.
[30]
Color extended visual cryptography using error diffusion.
[31]
Cheating prevention in visual cryptography.
[32]
Halftone visual cryptography.
[33]
A neural-network approach for visual cryptography and authorization.
[34]
Secure information display with limited viewing zone by use of multi-color visual cryptography.
[35]
Securing information display by use of visual cryptography.
[36]
Basic visual cryptography algorithms
[37]
Sharing More Information in Visual Cryptography Scheme with Block Expansion
[38]
Efficient constructions for progressive visual cryptography with meaningful shares
[39]
A (2,2) XOR-based visual cryptography scheme without pixel expansion
[40]
Near-optimal pitch for the optical implementation of dynamic visual cryptography
[41]
A new two-level information protection scheme based on visual cryptography and QR code with multiple decryptions
[42]
Random grid based color visual cryptography scheme for black and white secret images with general access structures
[43]
Secure telemedicine using RONI halftoned visual cryptography without pixel expansion
[44]
Secure E-payment method based on visual cryptography
[45]
Password processing scheme using enhanced visual cryptography and OCR in hybrid cloud environment
[46]
Secure image transmission based on visual cryptography scheme and artificial neural network-particle swarm optimization-guided adaptive vector quantization
[47]
A combination of color-black-and-white visual cryptography and polynomial based secret image sharing
[48]
Pipelined parallel rotational visual cryptography (PPRVC)
[49]
Secret multiple share creation with color images using visual cryptography
[50]
Visual cryptography for message confidentiality
[51]
Cheat immune visual cryptography for secure transmission of images
[52]
Recursive visual cryptography for multiple secret image sharing
[53]
A highly robust and secure image watermarking based on classification and visual cryptography
[54]
A Construction of the (4, n)-Threshold Visual Cryptography Scheme Using a 3-Design
[55]
Secure data transmission in cloud environment using visual cryptography and genetic algorithm: A review
[56]
Improving the Visual Quality of Size-Invariant Visual Cryptography for Grayscale Images: An Analysis-by-Synthesis (AbS) Approach
[57]
Authentication for ID cards based on colour visual cryptography and facial recognition
[58]
Generalized visual cryptography scheme with completely random shares
[59]
A Visual Cryptography Based Watermark Technology for Individual and Group Images
[60]
Simple Electromagnetic Analysis in Cryptography
[61]
Personalized Shares in Visual Cryptography
[62]
Multiple Schemes for Mobile Payment Authentication Using QR Code and Visual Cryptography
[63]
New fool proof examination system through color visual cryptography and signature authentication
[64]
Separable Reversible Data Hiding in Encrypted Signals with Public Key Cryptography
[65]
A Luggage Control System Based on NFC and Homomorphic Cryptography
[66]
New mission and opportunity for mathematics researchers: Cryptography in the quantum era
[67]
Improved elliptical curve cryptography and Abelian group theory to resolve linear system problem in sensor-cloud cluster computing
[68]
Energy-aware dynamic Internet of Things security system based on Elliptic Curve Cryptography and Message Queue Telemetry Transport protocol for mitigating Replay attacks
[69]
Special section on cryptography and information security
[70]
An Approach to Cryptography Based on Continuous-Variable Quantum Neural Network.
[71]
Neural Cryptography Based on Complex-Valued Neural Network.
[72]
Perfect secrecy cryptography via mixing of chaotic waves in irreversible time-varying silicon chips.
[73]
DNA origami cryptography for secure communication.
[74]
Securing IoT-Based RFID Systems: A Robust Authentication Protocol Using Symmetric Cryptography.
[75]
On the distribution of quadratic residues and non-residues modulo composite integers and applications to cryptography
[76]
SDSRS: A Novel White-Box Cryptography Scheme for Securing Embedded Devices in IIoT
[77]
Ciphertext-only attack on optical scanning cryptography
[78]
Nonassociative Algebraic Structures in Cryptography and Coding
[79]
Implementation and practical problems of chaos-based cryptography revisited
[80]
Letters for post-quantum cryptography standard evaluation
[81]
An elliptic curve cryptography based enhanced anonymous authentication protocol for wearable health monitoring systems
[82]
A xor-based visual cryptography scheme for (2, n) access structure with ideal structure division
[83]
Cryptanalysis cipher text using new modeling: Text encryption using elliptic curve cryptography
[84]
Survey on hyperelliptic curve cryptography to secure cloud computing
[85]
Defense model for preserving the wind turbine Records in Cloud Using fog Computing with coupling based cryptography
[86]
Terahertz quantum cryptography
[87]
Develop cloud security in cryptography techniques using DES-3l algorithm method in cloud computing
[88]
Roger A. Grimes. Cryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today’s Crypto: John Wiley & Sons Inc., Hoboken, N.J., USA, 2020. ISBN 978-1-119-61819-5
[89]
Secure Image Transmission Using Chaotic-Enhanced Elliptic Curve Cryptography
[90]
Lightweight Cryptography: A Solution to Secure IoT
[91]
A Novel Method for Key Establishment Based on Symmetric Cryptography in Hierarchical Wireless Sensor Networks
[92]
The Relevance of Using Post-quantum Cryptography on the Isogenies of Elliptic Curves for Mobile Application Protection
[93]
New approach to practical leakage-resilient public-key cryptography
[94]
Cryptography from information loss
[95]
Triple phase hybrid cryptography technique in a wireless sensor network
[96]
Securing Data in Internet of Things (IoT) Using Cryptography and Steganography Techniques
[97]
Quantum computing cryptography: Finding cryptographic Boolean functions with quantum annealing by a 2000 qubit D-wave quantum computer
[98]
Hierarchical visual cryptography for multisecret images based on a modified phase retrieval algorithm
[99]
Image Cryptography using Parameterized Multiband Eigen Wavelet Filterbank
[100]
Securing IoT-Based RFID Systems: A Robust Authentication Protocol Using Symmetric Cryptography
[101]
Securing blockchain with quantum safe cryptography: When and how?