Image scene geometry recognition using low-level features fusion at multi-layer deep CNN A Khan, A Chefranov, H Demirel Neurocomputing 440, 111-126, 2021 | 42 | 2021 |
Hill cipher modification based on eigenvalues hcm-EE AY Mahmoud, AG Chefranov Proceedings of the 2nd international conference on Security of information …, 2009 | 40 | 2009 |
White blood cell type identification using multi-layer convolutional features with an extreme-learning machine A Khan, A Eker, A Chefranov, H Demirel Biomedical Signal Processing and Control 69, 102932, 2021 | 36 | 2021 |
One-time password authentication with infinite hash chains AG Chefranov Novel algorithms and techniques in telecommunications, automation and …, 2008 | 34 | 2008 |
Hill cipher modification based on pseudo-random eigenvalues A Mahmoud, A Chefranov Applied Mathematics & Information Sciences 8 (2), 505, 2014 | 32 | 2014 |
Secure hill cipher modification shc-m AG Chefranov, A Elci, B Ors, B Preneel Proc. Of the First International Conference on Security of Information and …, 2008 | 27 | 2008 |
Secure hill cipher modification based on generalized permutation matrix SHC-GPM AY Mahmoud, AG Chefranov Information Sciences Letters, 91-102, 2012 | 22 | 2012 |
Secure Hill cipher modifications and key exchange protocol AY Mahmoud, AG Chefranov 2010 IEEE international conference on automation, quality and testing …, 2010 | 21 | 2010 |
Hydrodynamic Methods and Exact Solutions in Application to the Electromagnetic Field Theory in Medium SG Chefranov, AS Chefranov Nonlinear Optics-Novel Results in Theory and Applications, 2018 | 20 | 2018 |
A hill cipher modification based on eigenvalues extension with dynamic key size hcm-exdks AY Mahmoud, AG Chefranov International Journal of Computer Network and Information Security 6 (5), 57, 2014 | 20 | 2014 |
Elgamal public key cryptosystem and signature scheme in GU (m, p, n) AG Chefranov, AY Mahmoud Proceedings of the 3rd international conference on Security of information …, 2010 | 20 | 2010 |
Encryption schemes with hyper-complex number systems and their hardware-oriented implementation E Doukhnitch, AG Chefranov, A Mahmoud Theory and Practice of Cryptography Solutions for Secure Information Systems …, 2013 | 18 | 2013 |
Hill cipher modification based on pseudo-random eigen values HCM-PRE YM Ahmed, A Chefranov Applied Mathematics and Information Sciences (SCI-E) 8 (2), 505-516, 2011 | 18 | 2011 |
Commutative matrix-based Diffie-Hellman-like key-exchange protocol AG Chefranov, AY Mahmoud Information Sciences and Systems 2013: Proceedings of the 28th International …, 2013 | 15 | 2013 |
The new exact solution of the compressible 3D Navier–Stokes equations SG Chefranov, AS Chefranov Communications in Nonlinear Science and Numerical Simulation 83, 105118, 2020 | 14 | 2020 |
Countering wrapping attack on XML signature in SOAP message for cloud computing HR Kouchaksaraei, AG Chefranov arXiv preprint arXiv:1310.0441, 2013 | 13 | 2013 |
Point vortices dynamics on a rotating sphere and modeling of global atmospheric vortices interaction II Mokhov, SG Chefranov, AG Chefranov Physics of Fluids 32 (10), 2020 | 12 | 2020 |
Exact solution of the compressible Euler–Helmholtz equation and the millennium prize problem generalization SG Chefranov, AS Chefranov Physica Scripta 94 (5), 054001, 2019 | 12 | 2019 |
Pseudo-random number generator RC4 period improvement AG Chefranov, TA Mazurova 2006 IEEE international conference on automation, quality and testing …, 2006 | 12 | 2006 |
Extrema of the Kinetic Energy and Its Dissipation Rate in Vortex Flows. AS Chefranov, SG Chefranov Doklady Physics 48 (12), 2003 | 12 | 2003 |