Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Artigo
|
![]() |
Utilization of secret sharing technology for secure communication: a state-of-the-art reviewSarosh, Parsa ; Parah, Shabir A. ; Bhat, G. M.Multimedia tools and applications, 2021, Vol.80 (1), p.517-541 [Periódico revisado por pares]New York: Springer USTexto completo disponível |
2 |
Material Type: Artigo
|
![]() |
Exploiting 2D compressed sensing and information entropy for secure color image compression and encryptionGan, Zhihua ; Bi, Jianqiang ; Ding, Wenke ; Chai, XiuliNeural computing & applications, 2021-10, Vol.33 (19), p.12845-12867 [Periódico revisado por pares]London: Springer LondonTexto completo disponível |
3 |
Material Type: Artigo
|
![]() |
Stream cipher designs: a reviewJiao, Lin ; Hao, Yonglin ; Feng, DengguoScience China. Information sciences, 2020-03, Vol.63 (3), p.131101, Article 131101 [Periódico revisado por pares]Beijing: Science China PressTexto completo disponível |
4 |
Material Type: Artigo
|
![]() |
Fault Attacks on the Authenticated Encryption Stream Cipher MORUSSalam, Iftekhar ; Simpson, Leonie ; Bartlett, Harry ; Dawson, Ed ; Koon-Ho Wong, KennethCryptography, 2018-03, Vol.2 (1), p.4 [Periódico revisado por pares]Basel: MDPI AGTexto completo disponível |
5 |
Material Type: Artigo
|
![]() |
RESeED: A secure regular‐expression search tool for storage cloudsSalehi, Mohsen Amini ; Caldwell, Thomas ; Fernandez, Alejandro ; Mickiewicz, Emmanuel ; Rozier, Eric W. D. ; Zonouz, Saman ; Redberg, DavidSoftware, practice & experience, 2017-09, Vol.47 (9), p.1221-1241 [Periódico revisado por pares]Chichester, UK: John Wiley & Sons, LtdTexto completo disponível |
6 |
Material Type: Artigo
|
![]() |
Enhancing Data Security: A Cutting-Edge Approach Utilizing Protein Chains in Cryptography and SteganographyMawla, Noura A. ; Khafaji, Hussein K.Computers (Basel), 2023-08, Vol.12 (8), p.166 [Periódico revisado por pares]Basel: MDPI AGTexto completo disponível |
7 |
Material Type: Artigo
|
![]() |
Data Distribution for Multiple Receivers in a Connected Car Environment Using 5G CommunicationKim, Won-Bin ; Seo, Daehee ; Kim, Donghyun ; Lee, Im-Yeong Wang, Jinwei ; Jinwei WangSecurity and communication networks, 2021, Vol.2021, p.1-14 [Periódico revisado por pares]London: HindawiTexto completo disponível |
8 |
Material Type: Artigo
|
![]() |
Biclique cryptanalysis on Midori block cipherZhao, Hongluan ; Han, GuoyongInternational journal of embedded systems, 2019, Vol.11 (2), p.229-239Geneva: Inderscience Publishers (IEL)Sem texto completo |
9 |
Material Type: Artigo
|
![]() |
A Robust Watermarking Scheme Based on ROI and IWT for Remote Consultation of COVID-19Zhang, Xiaorui ; Zhang, Wenfang ; Sun, Wei ; Xu, Tong ; Kumar Jha, SunilComputers, materials & continua, 2020-01, Vol.64 (3), p.1435-1452Henderson: Tech Science PressTexto completo disponível |
10 |
Material Type: Artigo
|
![]() |
Applying Spring Security Framework with KeyCloak-Based OAuth2 to Protect Microservice Architecture APIs: A Case StudyChatterjee, Ayan ; Prinz, AndreasSensors (Basel, Switzerland), 2022-02, Vol.22 (5), p.1703 [Periódico revisado por pares]Switzerland: MDPI AGTexto completo disponível |