Results 111 to 120 of about 25,084,029 (287)

Data security for third generation telecommunication systems [PDF]

open access: yes
This research work started as a humble, and yet ambitious attempt of enhancing the current security level in wireless data communication. Detailed analysis of the existing security protocols and wireless networks, together with their strengths and ...
Delivasilis, Dimitrios L.
core  

Data security is crucial for Japanese science [PDF]

open access: bronze, 2002
Eitaka Tsuboi   +4 more
openalex   +1 more source

High performance image steganography integrating IWT and Hamming code within secret sharing

open access: yesIET Image Processing
Steganography and secret sharing are schemes to increase the security of private information against attackers. Steganography emphasizes secrecy while secret sharing distributes the secret key in shares that are conditionally classified to reconstruct ...
Zahra Saeidi   +4 more
doaj   +1 more source

Integer wavelet transform‐based secret image sharing using rook polynomial and hamming code with authentication

open access: yesCAAI Transactions on Intelligence Technology
As an effective way to securely transfer secret images, secret image sharing (SIS) has been a noteworthy area of research. Basically in a SIS scheme, a secret image is shared via shadows and could be reconstructed by having the required number of them. A
Sara Charoghchi   +2 more
doaj   +1 more source

Design and Realization of a New Signal Security System for Multimedia Data Transmission [PDF]

open access: gold, 2003
Hun‐Chen Chen   +3 more
openalex   +1 more source

Enhancing Data Security of Cloud Based LMS. [PDF]

open access: yesWirel Pers Commun, 2023
Chatterjee P, Bose R, Banerjee S, Roy S.
europepmc   +1 more source

Home - About - Disclaimer - Privacy