Results 121 to 130 of about 2,287,880 (206)
High accuracy indoor positioning system using Galois field-based cryptography and hybrid deep learning. [PDF]
Hazzazi MM +5 more
europepmc +1 more source
MSD: Multi-stage deception for data privacy protection. [PDF]
Abdel Latif Ali T, Elsherbini MM.
europepmc +1 more source
A Decentralized Signcryption Scheme Based on CFL. [PDF]
Shi L, Liu M.
europepmc +1 more source
An efficient image encryption scheme based on Lorenz system and quantum-inspired walks. [PDF]
Karmany M +4 more
europepmc +1 more source
Quantum-resilient software security: A fuzzy AHP-based assessment framework in the era of quantum computing. [PDF]
Almotiri SH, Almotiri SH.
europepmc +1 more source
Unveiling a novel S-Box strategy: The dynamic 3D scrambling approach. [PDF]
Ahmad Khan N +7 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Contrast Optimization for Size Invariant Visual Cryptography Scheme
IEEE Transactions on Image Processing, 2023Visual cryptography scheme (VCS) serves as an effective tool in image security. Size-invariant VCS (SI-VCS) can solve the pixel expansion problem in traditional VCS.
Xiaotian Wu, Jia Fang, W. Yan
semanticscholar +1 more source
Sharing Multiple Secrets in XOR-Based Visual Cryptography by Non-Monotonic Threshold Property
IEEE transactions on circuits and systems for video technology (Print), 2023Multiple-secret visual cryptography scheme (MVCS) and fully incrementing visual cryptography scheme (FIVCS) have the same functionality that different secrets are gradually revealed by stacking different numbers of shadows. In essence, MVCS and FIVCS are
Xiaotian Wu, Na An, Zishuo Xu
semanticscholar +1 more source

