Výsledky vyhledávání - Encryption decryption algorithm
-
1
Zdroj: Theoretical & Applied Science. 144:9-14
-
2
Autoři:
Zdroj: International Journal of Sensors, Wireless Communications and Control. 15:64-75
-
3
Zdroj: Nanotechnology Perceptions. 20
-
4
Autoři: a další
Zdroj: International Journal of Mathematical Sciences and Computing. 8:30-40
-
5
Autoři: a další
Zdroj: VFAST Transactions on Mathematics. 10:14-30
-
6
Autoři:
Zdroj: Wireless Personal Communications. 125:939-963
-
7
Autoři:
Zdroj: International Journal of Scientific Research in Computer Science, Engineering and Information Technology. :745-748
Přístupová URL adresa: https://ijsrcseit.com/paper/CSEIT2063191.pdf
https://ijsrcseit.com/CSEIT2063191 -
8
Autoři: a další
Zdroj: International Journal of Innovative Technology and Exploring Engineering. 8:1280-1291
-
9
Autoři:
Zdroj: Cryptologia. 43:233-253
Témata: 0103 physical sciences, 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology, 01 natural sciences
-
10
-
11
Autoři:
Zdroj: Engineering Science and Technology, an International Journal, Vol 23, Iss 3, Pp 595-604 (2020)
Témata: Color image, 0103 physical sciences, 0202 electrical engineering, electronic engineering, information engineering, Chaotic sequences, Bit level scrambling, Modified Chua's Circuit, 02 engineering and technology, TA1-2040, Engineering (General). Civil engineering (General), Image encryption and decryption, 01 natural sciences
Přístupová URL adresa: https://doaj.org/article/7fc47f0ea4c043b38ff27b7a2fe991d3
https://www.sciencedirect.com/science/article/abs/pii/S2215098619306093
https://www.sciencedirect.com/science/article/pii/S2215098619306093
https://avesis.gazi.edu.tr/publication/details/8c94170f-12a4-4fbe-a932-bba0bb28414a/oai
https://avesis.gazi.edu.tr/publication/details/7ba412f9-017c-48b8-ae9c-3d4f800dd4e1/oai -
12
Autoři:
Zdroj: International Journal of Applied and Computational Mathematics. 8
-
13
Autoři: a další
Zdroj: Computers, Vol 11, Iss 3, p 39 (2022)
Témata: TTIED-CMYK mode, security, compression, capacity, encryption, decryption, Electronic computers. Computer science, QA75.5-76.95
Popis souboru: electronic resource
Přístupová URL adresa: https://doaj.org/article/d89de688f8c04d73815543a581c77355
-
14
Autoři: a další
Témata: Field programming gate array, encryption, advanced encryption standard, wireless connector, 5G communication, experimental testing
Přístupová URL adresa: https://hdl.handle.net/11587/444354
https://www.mdpi.com/2079-9292/9/10/1665/htm -
15
Autoři:
Zdroj: International Journal of Security and Its Applications. 10:1-8
Přístupová URL adresa: https://www.earticle.net/Article/A284891
-
16
Autoři: Yuan, Jinming
Zdroj: Tehnički vjesnik; ISSN 1848-6339 (Online); ISSN 1330-3651 (Print); ISSN-L 1330-3651; Volume 32; Issue 2
Témata: cloud computing, data embedding, image encryption, network attack, pixel sorting, text, info:eu-repo/semantics/article, info:eu-repo/semantics/publishedVersion
URL:
https://doi.org/10.17559/TV-20240321001416 https://hrcak.srce.hr/328569 https://hrcak.srce.hr/file/475009
info:eu-repo/semantics/altIdentifier/doi/10.17559/TV-20240321001416 -
17
-
18
Autoři: a další
Zdroj: 2019 IEEE 1st International Conference on Energy, Systems and Information Processing (ICESIP).
Témata: 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology, 7. Clean energy
-
19
Autoři:
Zdroj: International Journal of Image and Graphics. 10:327-341
Témata: 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology
-
20
Autoři:
Zdroj: i-manager's Journal on Computer Science. 2:26-31
Přístupová URL adresa: https://www.imanagerpublications.com/article/2848
Nájsť tento článok vo Web of Science
Full Text Finder