A Reliable Image Steganography with Image Clustering and Robust Steganography using IWT Journal title: International Journal of Research in Computer and Communication Technology Authors: K Sirisha, B.V. Ramana Subject(s): Computer and Information Science, Telecommunications
The Safety Framework in Network Security utilizing Cryptographic Systems Journal title: International Journal of Research in Computer and Communication Technology Authors: Rakesh Nayak Subject(s): Computer and Information Science, Telecommunications
Encryption EXIF Metadata for Protection Photographic Image of Copyright Piracy Journal title: International Journal of Research in Computer and Communication Technology Authors: Hendro Wijayanto, Imam Riadi, Yudi Prayudi Subject(s): Computer and Information Science, Telecommunications
Information system access control Journal title: Acta Economica Authors: Весна Алексић-Марић, PhD Subject(s): Economics
A Survey of Key Negotiation and Authentication Systems in WSNs Journal title: EAI Endorsed Transactions on Energy Web Authors: Mohammad Tehseen, Huma Javed, Ishtiaq Hussain Shah, Sheeraz Ahmed Subject(s): Computer and Information Science, Energy
Non-Recurring Improved Random Number Generator- a new step to improve cryptographic algorithms Journal title: EAI Endorsed Transactions on Energy Web Authors: Thomas Antu Annam, Paul Varghese Subject(s): Computer and Information Science, Energy
Authenticated Mobile Groups To Secure The Backhaul: A New Paradigm And Challenges Journal title: EAI Endorsed Transactions on Cloud Systems Authors: Naim Qachri, Jean-Michel Dricot Subject(s): Computer and Information Science
Kombinasi Arnold Cat Map dan Modifikasi Hill Cipher Menggunakan Kode Bunyi Beep BIOS PHOENIX Journal title: Sisfotenika Authors: Elvis Pawan, Kaharuddin Kaharuddin, Dony Arius Subject(s): Computer and Information Science, Technology
The issues connected with the anonymization of medical data. Part 1. The introduction to the anonymization of medical data. Ensuring the protection of sensitive information with the use of such methods as f(a) and f(a,b) Journal title: Medical Science Pulse Authors: ARKADIUSZ LIBER Subject(s): Medicine, Internal Medicine
The issues connected with the anonymization of medical data. Part 2. Advanced anonymization and anonymization controlled by owner of protected sensitive data Journal title: Medical Science Pulse Authors: Arkadiusz Liber Subject(s): Medicine, Internal Medicine
Podpisy kwantowe zapewniające bezwarunkową autentyczność dokumentacji medycznej Journal title: Medical Science Pulse Authors: Arkadiusz Liber, Rafał Rusek Subject(s): Medicine, Internal Medicine
Signatures for unconditional save authenticity protection of medical dokumentation Journal title: Medical Science Pulse Authors: Arkadiusz Liber, Rafał Rusek Subject(s): Medicine, Internal Medicine
A Fuzzy Commitment Scheme with McEliece's Cipher Journal title: Surveys in Mathematics and its Applications Authors: Deo Ojha, Ajay Sharma Subject(s):
Generation of a pool of variable size symmetric keys through Image Journal title: International Journal on Computer Science and Engineering Authors: Prerna Garg , Deepak Garg Subject(s):
Can Intelligent Design Be Considered Scientific in the Same Way That SETI Is? Journal title: Filozoficzne Aspekty Genezy Authors: Robert Camp Subject(s):