Search Results - Encryption and Decryption Algorithm
-
1
Authors: Nizomiddin Najmiddin ugli Ochilov
Source: Theoretical & Applied Science. 144:9-14
-
2
Authors:
Source: International Journal of Sensors, Wireless Communications and Control. 15:64-75
-
3
Source: Nanotechnology Perceptions. 20
-
4
Authors: et al.
Source: International Journal of Mathematical Sciences and Computing. 8:30-40
-
5
Authors: et al.
Source: VFAST Transactions on Mathematics. 10:14-30
-
6
Authors:
Source: Wireless Personal Communications. 125:939-963
-
7
Authors:
Source: International Journal of Scientific Research in Computer Science, Engineering and Information Technology. :745-748
-
8
Authors: et al.
Source: International Journal of Innovative Technology and Exploring Engineering. 8:1280-1291
-
9
Authors:
Source: Cryptologia. 43:233-253
Subject Terms: 0103 physical sciences, 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology, 01 natural sciences
-
10
-
11
Authors:
Source: Engineering Science and Technology, an International Journal, Vol 23, Iss 3, Pp 595-604 (2020)
Subject Terms: Color image, 0103 physical sciences, 0202 electrical engineering, electronic engineering, information engineering, Chaotic sequences, Bit level scrambling, Modified Chua's Circuit, 02 engineering and technology, TA1-2040, Engineering (General). Civil engineering (General), Image encryption and decryption, 01 natural sciences
Access URL: https://doaj.org/article/7fc47f0ea4c043b38ff27b7a2fe991d3
https://www.sciencedirect.com/science/article/abs/pii/S2215098619306093
https://www.sciencedirect.com/science/article/pii/S2215098619306093
https://avesis.gazi.edu.tr/publication/details/8c94170f-12a4-4fbe-a932-bba0bb28414a/oai
https://avesis.gazi.edu.tr/publication/details/7ba412f9-017c-48b8-ae9c-3d4f800dd4e1/oai -
12
Authors:
Source: International Journal of Applied and Computational Mathematics. 8
-
13
Authors: et al.
Source: Computers, Vol 11, Iss 3, p 39 (2022)
Subject Terms: TTIED-CMYK mode, security, compression, capacity, encryption, decryption, Electronic computers. Computer science, QA75.5-76.95
File Description: electronic resource
-
14
Authors: et al.
-
15
Authors:
Source: International Journal of Security and Its Applications. 10:1-8
Access URL: https://www.earticle.net/Article/A284891
-
16
Authors: Yuan, Jinming
Source: Tehnički vjesnik; ISSN 1848-6339 (Online); ISSN 1330-3651 (Print); ISSN-L 1330-3651; Volume 32; Issue 2
Index Terms: cloud computing, data embedding, image encryption, network attack, pixel sorting, text, info:eu-repo/semantics/article, info:eu-repo/semantics/publishedVersion
URL:
https://doi.org/10.17559/TV-20240321001416 https://hrcak.srce.hr/328569 https://hrcak.srce.hr/file/475009
info:eu-repo/semantics/altIdentifier/doi/10.17559/TV-20240321001416 -
17
-
18
Authors: et al.
Source: 2019 IEEE 1st International Conference on Energy, Systems and Information Processing (ICESIP).
Subject Terms: 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology, 7. Clean energy
-
19
Authors:
Source: International Journal of Image and Graphics. 10:327-341
Subject Terms: 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology
-
20
Authors:
Source: i-manager's Journal on Computer Science. 2:26-31
Nájsť tento článok vo Web of Science
Full Text Finder