ELLIPTIC CURVE CRYPTOGRAPHY IN SECURING NETWORKS BY MOBILE AUTHENTICATION
A Secure Color Image Steganography in Transform Domain
A New Method for Preserving Privacy in Data Publishing Against Attribute and Identity Disclosure Risk
A critical reassessment of
A novel authenticated cipher for rfid systems
PERFORMANCE ANALYSIS OF SHA-2 AND SHA-3 FINALISTS
An efficient algorithm for sequence generation in data mining
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
Randomness evaluation framework of cryptographic algorithms
Survey on information sharing
Automatic tempest test and analysis system
A PAIRING-FREE IDENTITY BASED TRIPARTITE SIGNCRYPTION SCHEME
A NEW ATTACK ON RSA WITH A COMPOSED DECRYPTION EXPONENT
Hardware Implementation of Algorithm for Cryptanalysis
Design of Mobile Public Key Infrastructure (M-PKI) Using Elliptic Curve Cryptography
BLIND AND ROBUST IMAGES WATERMARKING BASED ON WAVELET AND EDGE INSERTION
Secure Image Transfer in The Domain Transform DFT
An Encryption Algorithm To Evaluate Performance Of V2v Communication In Vanet
Translation of sign language using generic fourier descriptor and nearest neighbour