-
1
-
-
22844454698
-
Photograph signatures for the protection of identification documents
-
LNCS
-
Bellamy, B., Mason, J. S., Ellis, M.: Photograph signatures for the protection of identification documents. Proc. of Crypto & Coding'99, LNCS 1746 (1999) 119-128.
-
(1999)
Proc. of Crypto & Coding'99
, vol.1746
, pp. 119-128
-
-
Bellamy, B.1
Mason, J.S.2
Ellis, M.3
-
2
-
-
0022716288
-
A simple unpredictable pseudo-random number generator
-
Blum, L., Blum, M., Shub, M.: A simple unpredictable pseudo-random number generator. SIAM J. Comput. 15 (1986) 364-383.
-
(1986)
SIAM J. Comput.
, vol.15
, pp. 364-383
-
-
Blum, L.1
Blum, M.2
Shub, M.3
-
3
-
-
0036605019
-
An image intellectual property protection scheme for gray-level images using visual secret sharing strategy
-
Chang, C. C., Chuang, J. C.: An image intellectual property protection scheme for gray-level images using visual secret sharing strategy. Pattern Recogn. Lett. 23 (2002) 931-941.
-
(2002)
Pattern Recogn. Lett.
, vol.23
, pp. 931-941
-
-
Chang, C.C.1
Chuang, J.C.2
-
4
-
-
0035451781
-
A new encryption algorithm for images cryptosystems
-
Chang, C., Hwang, M., Chen, T.: A new encryption algorithm for images cryptosystems. J. Syst. Software 58 (2001) 83-91.
-
(2001)
J. Syst. Software
, vol.58
, pp. 83-91
-
-
Chang, C.1
Hwang, M.2
Chen, T.3
-
5
-
-
0031222252
-
A linear quadtree compression scheme for image encryption
-
Chang, C., Liu, J. L.: A linear quadtree compression scheme for image encryption. Signal Process. Image 10 (1997) 279-290.
-
(1997)
Signal Process. Image
, vol.10
, pp. 279-290
-
-
Chang, C.1
Liu, J.L.2
-
7
-
-
0032089417
-
Symmetric ciphers based on two-dimensional chaotic maps
-
Fridrich, J.: Symmetric ciphers based on two-dimensional chaotic maps. Internat. J. Bifur. Chaos 8, 6 (1998) 1259-1284.
-
(1998)
Internat. J. Bifur. Chaos
, vol.8
, Issue.6
, pp. 1259-1284
-
-
Fridrich, J.1
-
8
-
-
8344240577
-
Maximal periods of orbits of the BBS generator
-
Hernández Encinas, L., Montoya Vitini, F., Muñoz Masqué, J., Peinado Domínguez, A.: Maximal periods of orbits of the BBS generator. Proc. 1998 Int. Conf. on Inform. Secur. & Cryptol. (1998) 71-80.
-
(1998)
Proc. 1998 Int. Conf. on Inform. Secur. & Cryptol.
, pp. 71-80
-
-
Hernández Encinas, L.1
Montoya Vitini, F.2
Muñoz Masqué, J.3
Peinado Domínguez, A.4
-
9
-
-
84944878354
-
-
CRC Press, Boca Raton, FL
-
Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of applied cryptography. CRC Press, Boca Raton, FL, 1997.
-
(1997)
Handbook of Applied Cryptography
-
-
Menezes, A.1
Van Oorschot, P.2
Vanstone, S.3
-
11
-
-
84958648410
-
Visual authentication and identification
-
LNCS
-
Naor. M., Pinkas, B.: Visual authentication and identification. Proc. of Crypto'97, LNCS 1294 (1997) 322-336.
-
(1997)
Proc. of Crypto'97
, vol.1294
, pp. 322-336
-
-
Naor, M.1
Pinkas, B.2
-
13
-
-
0032180265
-
Secure identification documents via pattern recognition and public-key cryptography
-
O'Gorman. L., Rabinovich, I.: Secure identification documents via pattern recognition and public-key cryptography. IEEE Trans. Pattern Anal. Mach. Intell. 20, 10 (1998) 1097-1102.
-
(1998)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.20
, Issue.10
, pp. 1097-1102
-
-
O'Gorman, L.1
Rabinovich, I.2
-
14
-
-
34250116432
-
Two-dimensional cellular automata
-
Packard, N. H., Wolfram, S.: Two-dimensional cellular automata. J. Statist. Phys. 38 (1985) 901-946.
-
(1985)
J. Statist. Phys.
, vol.38
, pp. 901-946
-
-
Packard, N.H.1
Wolfram, S.2
|