-
1
-
-
46649089537
-
Role of communications satellites in national development
-
G.M. Nair Role of communications satellites in national development IETE Technical Review 25 2008 3 8
-
(2008)
IETE Technical Review
, vol.25
, pp. 3-8
-
-
Nair, G.M.1
-
6
-
-
0037655704
-
A new chaotic mirror-like image encryption algorithm and its VLSI architecture
-
J.C. Yen, and J.I. Guo A new chaotic mirror-like image encryption algorithm and its VLSI architecture Pattern Recognition and Image Analysis 10 2 2000 236 247
-
(2000)
Pattern Recognition and Image Analysis
, vol.10
, Issue.2
, pp. 236-247
-
-
Yen, J.C.1
Guo, J.I.2
-
7
-
-
0000635245
-
Efficient hierarchical chaotic image encryption algorithm and its VLSI realization
-
J.C. Yen, and J.I. Guo Efficient hierarchical chaotic image encryption algorithm and its VLSI realization IEE Proceedings. Vision, Image & Signal Processing 147 2 2000 167 175
-
(2000)
IEE Proceedings. Vision, Image & Signal Processing
, vol.147
, Issue.2
, pp. 167-175
-
-
Yen, J.C.1
Guo, J.I.2
-
8
-
-
18244420943
-
Improving security of a chaotic encryption approach
-
S. Li, X. Mou, and Y. Cai Improving security of a chaotic encryption approach Physics Letters A 290 3 2001 127 133
-
(2001)
Physics Letters A
, vol.290
, Issue.3
, pp. 127-133
-
-
Li, S.1
Mou, X.2
Cai, Y.3
-
11
-
-
33846419477
-
Chaotic secure content-based hidden transmission of biometrics templates
-
M.K. Khan, J. Zhang, and L. Tian Chaotic secure content-based hidden transmission of biometrics templates Chaos, Solitons and Fractals 32 2007 1749 1759
-
(2007)
Chaos, Solitons and Fractals
, vol.32
, pp. 1749-1759
-
-
Khan, M.K.1
Zhang, J.2
Tian, L.3
-
12
-
-
0032089417
-
Symmetric ciphers based on two-dimensional chaotic maps
-
J. Fridrich Symmetric ciphers based on two-dimensional chaotic maps International Journal of Bifurcation and Chaos 8 6 1998 1259 1284
-
(1998)
International Journal of Bifurcation and Chaos
, vol.8
, Issue.6
, pp. 1259-1284
-
-
Fridrich, J.1
-
13
-
-
18244420943
-
Improving security of a chaotic encryption approach
-
S. Li, X. Mou, and Y. Cai Improving security of a chaotic encryption approach Physics Letters A 290 2001 127 133
-
(2001)
Physics Letters A
, vol.290
, pp. 127-133
-
-
Li, S.1
Mou, X.2
Cai, Y.3
-
14
-
-
34548620637
-
Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices
-
M.K. Khan, and J. Zhang Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices Chaos, Solitons and Fractals 35 2008 519 524
-
(2008)
Chaos, Solitons and Fractals
, vol.35
, pp. 519-524
-
-
Khan, M.K.1
Zhang, J.2
-
15
-
-
0042786512
-
Cryptography with chaos
-
M.S. Baptista Cryptography with chaos Physics Letters A 240 1998 50 54
-
(1998)
Physics Letters A
, vol.240
, pp. 50-54
-
-
Baptista, M.S.1
-
16
-
-
0012890678
-
Discrete chaotic cryptography (DCC): New method for secure communication
-
Z. Kotulski, J. Szczepanski, Discrete chaotic cryptography (DCC): New method for secure communication, in: Proceedings of NEEDS'97, 1997
-
(1997)
Proceedings of NEEDS'97
-
-
Kotulski, Z.1
Szczepanski, J.2
-
17
-
-
84950900200
-
The derivation of a chaotic encryption algorithm
-
R. Matthews The derivation of a chaotic encryption algorithm Cryptologia XII 1 1989 29 42
-
(1989)
Cryptologia
, vol.12
, Issue.1
, pp. 29-42
-
-
Matthews, R.1
-
19
-
-
0038938048
-
Application of discrete chaotic dynamical systems in cryptographyDCC method
-
Z. Kotulski, J. Szczepanski, K. Gorski, Z. Paszkiewicz, and A. Zugaj Application of discrete chaotic dynamical systems in cryptographyDCC method International Journal of Bifurcation and Chaos 9 1999 1121 1135
-
(1999)
International Journal of Bifurcation and Chaos
, vol.9
, pp. 1121-1135
-
-
Kotulski, Z.1
Szczepanski, J.2
Gorski, K.3
Paszkiewicz, Z.4
Zugaj, A.5
-
22
-
-
0037053849
-
A fast chaotic cryptography scheme with dynamic look-up table
-
K.W. Wong A fast chaotic cryptography scheme with dynamic look-up table Physics Letters A 298 2002 238 242
-
(2002)
Physics Letters A
, vol.298
, pp. 238-242
-
-
Wong, K.W.1
-
23
-
-
56449089063
-
Multimodal face and fingerprint biometrics authentication on space-limited tokens
-
M.K. Khan, and J. Zhang Multimodal face and fingerprint biometrics authentication on space-limited tokens Neurocomputing 71 1315 2008 3026 3031
-
(2008)
Neurocomputing
, vol.71
, Issue.13
, pp. 3026-3031
-
-
Khan, M.K.1
Zhang, J.2
-
24
-
-
0037451060
-
Discrete chaotic cryptography using external key
-
N.K. Pareek, V. Patidar, and K.K. Sud Discrete chaotic cryptography using external key Physics Letters A 309 2003 75 82
-
(2003)
Physics Letters A
, vol.309
, pp. 75-82
-
-
Pareek, N.K.1
Patidar, V.2
Sud, K.K.3
-
25
-
-
33745735137
-
Application of data encryption standard to bitmap and JPEG images
-
NRSC, March
-
I. Ziedan, M. Fouad, D.H. Salem, Application of data encryption standard to bitmap and JPEG images, in: Proceedings Twentieth National Radio Science Conference, NRSC, March 2003, pp. C16
-
(2003)
Proceedings Twentieth National Radio Science Conference
-
-
Ziedan, I.1
Fouad, M.2
Salem, D.H.3
-
26
-
-
62749096566
-
Quality of encryption measurement of bitmap images with RC6, MRC6, and Rijndael block cipher algorithms
-
N. Fishawy, and O.M.A. Zaid Quality of encryption measurement of bitmap images with RC6, MRC6, and Rijndael block cipher algorithms International Journal of Network Security 5 3 2007 241 251
-
(2007)
International Journal of Network Security
, vol.5
, Issue.3
, pp. 241-251
-
-
Fishawy, N.1
Zaid, O.M.A.2
-
27
-
-
84856043672
-
A mathematical theory of communication
-
C.E. Shannon A mathematical theory of communication The Bell System Technical Journal 27 3 1948 379 423 623656
-
(1948)
The Bell System Technical Journal
, vol.27
, Issue.3
, pp. 379-423
-
-
Shannon, C.E.1
|