ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Cryptographic Scheme for Group Passwords Distribution in Steganographic Systems
2021 Ural Symposium on Biomedical Engineering, Radioelectronics and Information Technology (USBEREIT)
◽
10.1109/usbereit51232.2021.9455085
◽
2021
◽
Author(s):
Ivan Nechta
Keyword(s):
Cryptographic Scheme
Download Full-text
Related Documents
Cited By
References
Confirming Secured E-Commerce Transaction Environment Supported by A New Symmetric Key Cryptographic Scheme
International Journal of Computer Sciences and Engineering
◽
10.26438/ijcse/v6i8.414423
◽
2018
◽
Vol 6
(8)
◽
pp. 414-423
Author(s):
B. Biswas
◽
A.K. Khan
Keyword(s):
Symmetric Key
◽
Cryptographic Scheme
Download Full-text
A Hybrid Lightweight Cryptographic Scheme For Securing Node Data Based On The Feistel Cipher And MD5 Hash Algorithm In A Local IoT Network
2019 International Conference on Mechatronics, Remote Sensing, Information Systems and Industrial Information Technologies (ICMRSISIIT)
◽
10.1109/icmrsisiit46373.2020.9405869
◽
2019
◽
Author(s):
Bismark Tei Asare
◽
Kester Quist-Aphetsi
◽
Laurent Nana
Keyword(s):
Hash Algorithm
◽
Cryptographic Scheme
Download Full-text
Scalable cryptographic scheme for networked multimedia applications
Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205)
◽
10.1109/icip.2001.958291
◽
2002
◽
Author(s):
K.J. Han
◽
A.H. Tewfik
Keyword(s):
Multimedia Applications
◽
Networked Multimedia
◽
Cryptographic Scheme
Download Full-text
Access control in decentralized online social networks: Applying a policy-hiding cryptographic scheme and evaluating its performance
2014 IEEE International Conference on Pervasive Computing and Communication Workshops (PERCOM WORKSHOPS)
◽
10.1109/percomw.2014.6815278
◽
2014
◽
Cited By ~ 12
Author(s):
Oleksandr Bodriagov
◽
Gunnar Kreitz
◽
Sonja Buchegger
Keyword(s):
Social Networks
◽
Access Control
◽
Online Social Networks
◽
Cryptographic Scheme
◽
Decentralized Online Social Networks
Download Full-text
An efficient XOR-based verifiable visual cryptographic scheme
Multimedia Tools and Applications
◽
10.1007/s11042-018-6779-6
◽
2018
◽
Vol 78
(7)
◽
pp. 8207-8223
◽
Cited By ~ 4
Author(s):
Xingxing Jia
◽
Daoshun Wang
◽
Qimeng Chu
◽
Zhenhua Chen
Keyword(s):
Cryptographic Scheme
Download Full-text
Definition and Development of a Topology-Based Cryptographic Scheme for Wireless Sensor Networks
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering - Sensor Systems and Software
◽
10.1007/978-3-319-04166-7_4
◽
2013
◽
pp. 47-64
◽
Cited By ~ 3
Author(s):
Stefano Marchesani
◽
Luigi Pomante
◽
Marco Pugliese
◽
Fortunato Santucci
Keyword(s):
Wireless Sensor Networks
◽
Sensor Networks
◽
Wireless Sensor
◽
Cryptographic Scheme
Download Full-text
A Hybrid Cryptographic Scheme of Modified Vigenère Cipher using Randomized Approach for Enhancing Data Security
International Journal of Computer Applications
◽
10.5120/ijca2021921290
◽
2021
◽
Vol 183
(2)
◽
pp. 1-8
Author(s):
Sazzad Hossain Saju
◽
Sayed Mahmudul Haque
◽
Liakot Hossain Lingcon
Keyword(s):
Data Security
◽
Cryptographic Scheme
Download Full-text
A Cryptographic Scheme for Computerized General Elections
Advances in Cryptology — CRYPTO ’91 - Lecture Notes in Computer Science
◽
10.1007/3-540-46766-1_33
◽
2007
◽
pp. 405-419
◽
Cited By ~ 20
Author(s):
Kenneth R. Iversen
Keyword(s):
General Elections
◽
Cryptographic Scheme
Download Full-text
A New Black and White Visual Cryptographic Scheme for General Access Structures
Progress in Cryptology - INDOCRYPT 2004 - Lecture Notes in Computer Science
◽
10.1007/978-3-540-30556-9_31
◽
2004
◽
pp. 399-413
◽
Cited By ~ 18
Author(s):
Avishek Adhikari
◽
Tridib Kumar Dutta
◽
Bimal Roy
Keyword(s):
Black And White
◽
Access Structures
◽
Cryptographic Scheme
Download Full-text
Visual Cryptographic Scheme on Hand Gesture Recognition for Robotic Automation
Computer Application and Signal Processing 2014
◽
10.3850/978-981-09-1137-9_p026
◽
2014
◽
Author(s):
Swati Chamele
◽
Hemlata Dakhore
Keyword(s):
Gesture Recognition
◽
Hand Gesture Recognition
◽
Hand Gesture
◽
Robotic Automation
◽
Cryptographic Scheme
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close