Results 71 to 80 of about 85,998 (202)

Hierarchical secure key assignment scheme. [PDF]

open access: yesPLoS One
Celiktas B   +3 more
europepmc   +1 more source

Secure edge-guided adaptive image steganography using HED-based attention maps and CNN. [PDF]

open access: yesSci Rep
Alrawashdeh R   +4 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy