A Secure Network Communication Protocol Based on Text to Barcode Encryption Algorithm
暂无分享,去创建一个
[1] Addepalli V. N. Krishna. Time stamp based ECC encryption and decryption , 2014, Int. Arab J. Inf. Technol..
[2] N. Koblitz. A Course in Number Theory and Cryptography , 1987 .
[3] Encryption of a Binary String Using Music Notes and Graph theory , 2013 .
[4] Shaik Rasool,et al. EFFICIENT DIGITAL ENCRYPTION ALGORITHM BASED ON MATRIX SCRAMBLING TECHNIQUE , 2010 .
[5] Ahmad Abusukhon,et al. Analyzing the Efficiency of Text-to-Image Encryption Algorithm , 2012 .
[6] Silvio Micali,et al. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..
[7] Neha Singla,et al. Image Encryption Using Block-Based Transformation Algorithm , 2014 .
[8] A. A. Zaidan,et al. On the Differences between Hiding Information and Cryptography Techniques: An Overview , 2010 .
[9] Ahmad Abusukhon,et al. A novel network security algorithm based on private key encryption , 2012, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).
[10] Soubhik Chakraborty,et al. A Symmetric Key Algorithm for Cryptography using Music , 2013 .
[11] Ahmad Abusukhon,et al. BLOCK CIPHER ENCRYPTION FOR TEXT-TO-IMAGE ALGORITHM , 2013 .
[12] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[13] Abusukhon Ahmad,et al. Distributed Text-to-Image Encryption Algorithm , 2014 .
[14] Anupkumar M Bongale,et al. Image Encryption based on FEAL Algorithm , 2013 .
[15] Cheng-Chi Lee,et al. A n2+n MQV key agreement protocol , 2013, Int. Arab J. Inf. Technol..
[16] Padma Bh,et al. Encoding And Decoding of a Message in the Implementation of Elliptic Curve Cryptography using Koblitz's Method , 2010 .
[17] V. R. Resmy,et al. Simple and Secure Image Encryption , 2012 .
[18] Ahmad Abusukhon,et al. SECURE NETWORK COMMUNICATION BASED ON TEXT-TO-IMAGE ENCRYPTION , 2012 .
[19] M. C. Adhikary,et al. Image Encryption Using Fibonacci-Lucas Transformation , 2012, ArXiv.
[20] Qi Li,et al. A security framework for wireless sensor networks , 2010 .
[21] Mohammad Reza Najaf Torkaman,et al. INNOVATIVE APPROACH TO IMPROVE HYBRID CRYPTOGRAPHY BY USINGDNA STEGANOGRAPHY , 2012 .
[22] Soubhik Chakraborty,et al. A Novel Method of Hiding Message Using Musical Notes , 2010 .
[23] Ajit Singh,et al. DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING , 2011 .