Vyzkoušejte nový nástroj s podporou AI
Summon Research Assistant
BETA
Secure Image Transcoding technique using chaotic key based algorithm
Anoop, B N, George, Sudhish N, Deepthi, P P
Published in International journal of advanced computer research (01.12.2012)
Get full text
Published in International journal of advanced computer research (01.12.2012)
Journal Article
Enhanced chaotic key-based algorithm for low-entropy image encryption
Yavuz, Erdem, Yazici, Rifat, Kasapbasi, Mustafa Cem, Yamac, Ezgi
Published in Signal Processing and Communications Applications Conference (01.04.2014)
Published in Signal Processing and Communications Applications Conference (01.04.2014)
Get full text
Conference Proceeding
New Physical Layer Key Generation Dimensions: Subcarrier Indices/Positions-Based Key Generation
Furqan, Haji M., Hamamreh, Jehad M., Arslan, Huseyin
Published in IEEE communications letters (01.01.2021)
Published in IEEE communications letters (01.01.2021)
Get full text
Journal Article
Secure image transcoding technique using chaotic key based algorithm with improved security
Anoop, B. N., George, S. N., Deepthi, P. P.
Published in 2013 International Multi-Conference on Automation, Computing, Communication, Control and Compressed Sensing (iMac4s) (01.03.2013)
Published in 2013 International Multi-Conference on Automation, Computing, Communication, Control and Compressed Sensing (iMac4s) (01.03.2013)
Get full text
Conference Proceeding
Modified Chaotic Key-Based Algorithm for Image Encryption and its VLSI Realization
Deergha Rao, K., Gangadhar, Ch
Published in 2007 15th International Conference on Digital Signal Processing (01.07.2007)
Published in 2007 15th International Conference on Digital Signal Processing (01.07.2007)
Get full text
Conference Proceeding
A Lightweight Identity Authentication Protocol for Nano-Scale IoT Devices
Radhi, Batool Mohammed, Ataalla, Abdalrahman Fatikhan, Alsayednoor, Huda Mohammed, Al-Shareeda, Mahmood A., Almaayah, Mohammed Amin, Obeidat, Mansour
Published in Engineering, technology & applied science research (06.10.2025)
Published in Engineering, technology & applied science research (06.10.2025)
Get full text
Journal Article
An efficient parallel algorithm for secured data communications using RSA public key cryptography method
Saxena, Sapna, Kapoor, Bhanu
Published in 2014 IEEE International Advance Computing Conference (IACC) (01.02.2014)
Published in 2014 IEEE International Advance Computing Conference (IACC) (01.02.2014)
Get full text
Conference Proceeding
Performance Analysis of Cryptographic Algorithms RSA and ECC in Wireless Sensor Networks
Verma, Deepika, Jain, Rekha, Shrivastava, Anurag
Published in IUP journal of telecommunications (01.08.2015)
Get full text
Published in IUP journal of telecommunications (01.08.2015)
Journal Article
Security role of biometrics in electronic transactions
Tyagi, Anshuman, Singh, Piyush Bhushan, Yadav, Vikash Singh, Singh, Sangharsh Kumar, Tiwari, Amod
Published in 2012 IEEE International Conference on Computational Intelligence and Computing Research (01.12.2012)
Published in 2012 IEEE International Conference on Computational Intelligence and Computing Research (01.12.2012)
Get full text
Conference Proceeding