Analytical study of hybrid techniques for image encryption and decryption
CL Chowdhary, PV Patel, KJ Kathrotia, M Attique… - Sensors, 2020 - mdpi.com
The majority of imaging techniques use symmetric and asymmetric cryptography algorithms
to encrypt digital media. Most of the research works contributed in the literature focus …
to encrypt digital media. Most of the research works contributed in the literature focus …
[HTML][HTML] Blockchain-based access control scheme for secure shared personal health records over decentralised storage
Blockchain technology provides a tremendous opportunity to transform current personal
health record (PHR) systems into a decentralised network infrastructure. However, such …
health record (PHR) systems into a decentralised network infrastructure. However, such …
Big data cryptography
MI Mihailescu, SL Nita, MI Mihailescu… - Pro Cryptography and …, 2021 - Springer
Big Data Cryptography | SpringerLink Skip to main content Advertisement SpringerLink
Account Menu Find a journal Publish with us Track your research Search Cart Book cover Pro …
Account Menu Find a journal Publish with us Track your research Search Cart Book cover Pro …
Low-Temperature H2/D2 Plasma–W Material Interaction and W Dust Production for Fusion-Related Studies
V Marascu, C Stancu, T Acsente, A Bonciu… - Coatings, 2023 - mdpi.com
In this paper, results concerning hydrogen and deuterium plasma (RF, 13.56 MHz)
interactions with tungsten surfaces, were reported. We used the Hollow-Cathode (HC) …
interactions with tungsten surfaces, were reported. We used the Hollow-Cathode (HC) …
Study on the Encryption and Decryption Capabilities of Hybrid Techniques for Images
NT Singh, R Dayal, D Kanwal, A Bhardwaj - International Conference on …, 2023 - Springer
Data plays an important role in modern life, and because more and more gadgets are
connecting to the internet, the amount of data stored online is growing at an alarming rate …
connecting to the internet, the amount of data stored online is growing at an alarming rate …
An Enhanced Rivest-Shamir-Adleman Algorithm Image Security Using Residue Number System
HO Sulaiman - 2022 - search.proquest.com
Digital communication creates millions of data in the form of digital images. In the world
today, encryption is mostly used to handle transactions over insecure channels of …
today, encryption is mostly used to handle transactions over insecure channels of …
[引用][C] Spell-checked Synonym-based Searchable Symmetric Encryption
S Steindl - 2020 - GRIN Verlag