Automatic tempest test and analysis system

il y a 9 ans 504 Vues

Secure routing path using trust values for

il y a 9 ans 299 Vues

Cryptography from quantum mechanical

il y a 9 ans 388 Vues

A critical reassessment of

il y a 9 ans 263 Vues

A proposed assessment metrics for image steganography

il y a 10 ans 537 Vues

A novel authenticated cipher for rfid systems

il y a 10 ans 266 Vues

A survey on privacy preserving data publishing

il y a 10 ans 1739 Vues

A NEW ATTACK ON RSA WITH A COMPOSED DECRYPTION EXPONENT

il y a 10 ans 502 Vues

A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM

il y a 10 ans 2487 Vues

PERFORMANCE ANALYSIS OF SHA-2 AND SHA-3 FINALISTS

il y a 10 ans 2240 Vues

An Improvement To The Set Protocol Based On Signcryption

il y a 10 ans 333 Vues