-
2
-
-
62549133356
-
Robust and efficient password-authenticcated key agreement using smart cards
-
W. S. Juang, S. T. Chen, and H. T. Liaw, "Robust and efficient password-authenticcated key agreement using smart cards," IEEE Transactions on Industrial Electronics, Vol. 55, 2008, pp. 2551-2556.
-
(2008)
IEEE Transactions on Industrial Electronics
, vol.55
, pp. 2551-2556
-
-
Juang, W.S.1
Chen, S.T.2
Liaw, H.T.3
-
3
-
-
75449106985
-
Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards
-
X. Li, W. Qiu, D. Zheng, K. Chen, and J. Li, "Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards" IEEE Transactions on Industrial Electronics, Vol. 57, 2010, pp. 793-800.
-
(2010)
IEEE Transactions on Industrial Electronics
, vol.57
, pp. 793-800
-
-
Li, X.1
Qiu, W.2
Zheng, D.3
Chen, K.4
Li, J.5
-
5
-
-
0034140374
-
A new remote user authentication scheme using smart cards
-
M. S. Hwang and L. H. Li, "A new remote user authentication scheme using smart cards," IEEE Transactions on Consumer Electronics, Vol. 46, 2000, pp. 28-30.
-
(2000)
IEEE Transactions on Consumer Electronics
, vol.46
, pp. 28-30
-
-
Hwang, M.S.1
Li, L.H.2
-
8
-
-
84866766130
-
Digital image watermarking for photo authentication in Thai national ID card
-
K. Thongkor and T. Amornraksa, "Digital image watermarking for photo authentication in Thai national ID card," in Proceedings of the 9th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology, 2012, pp. 1-4.
-
(2012)
Proceedings of the 9th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology
, pp. 1-4
-
-
Thongkor, K.1
Amornraksa, T.2
-
10
-
-
0035451781
-
A new encryption algorithm for image cryptosystems
-
C. C. Chang, M. S. Hwang, and T. S. Chen, "A new encryption algorithm for image cryptosystems," Journal of Systems and Software, Vol. 58, 2001, pp. 83-91.
-
(2001)
Journal of Systems and Software
, vol.58
, pp. 83-91
-
-
Chang, C.C.1
Hwang, M.S.2
Chen, T.S.3
-
11
-
-
77957253382
-
RSA-based digital image encryption algorithm in wireless sensor networks
-
G. Zhao, X. Yang, B. Zhou, and W. Wei, "RSA-based digital image encryption algorithm in wireless sensor networks," in Proceedings of the 2nd International Conference on Signal Processing Systems, 2010, pp. V2-640-V2-643.
-
(2010)
Proceedings of the 2nd International Conference on Signal Processing Systems
-
-
Zhao, G.1
Yang, X.2
Zhou, B.3
Wei, W.4
-
12
-
-
84868309583
-
ECC-based image encryption using code computing
-
Z. Zhao and X. Zhang, "ECC-based image encryption using code computing," in Proceedings of International Conference on Communication, Electronics and Automation Engineering Advances in Intelligent Systems and Computing, Vol. 181, 2013, pp. 859-865.
-
(2013)
Proceedings of International Conference on Communication, Electronics and Automation Engineering Advances in Intelligent Systems and Computing
, vol.181
, pp. 859-865
-
-
Zhao, Z.1
Zhang, X.2
-
13
-
-
83955163724
-
Elliptic curve ElGamal based homomorphic image encryption scheme for sharing secret
-
L. Li, A.A. Abd El-Latif, and X. Niu, "Elliptic curve ElGamal based homomorphic image encryption scheme for sharing secret," Signal Processing, Vol. 92, 2012, pp. 1069-1078.
-
(2012)
Signal Processing
, vol.92
, pp. 1069-1078
-
-
Li, L.1
Abd El-Latif, A.A.2
Niu, X.3
-
14
-
-
77955920069
-
A new chaos-based fast image encryption algorithm
-
Y. Wang, K. W. Wong, X. Liao, and G. Chen, "A new chaos-based fast image encryption algorithm," Applied Soft Computing, Vol. 11, 2011, pp. 514-522.
-
(2011)
Applied Soft Computing
, vol.11
, pp. 514-522
-
-
Wang, Y.1
Wong, K.W.2
Liao, X.3
Chen, G.4
-
15
-
-
84855614058
-
A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map
-
S. M. Seyedzadeh and S. Mirzakuchaki, "A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map," Signal Processing, Vol. 92, 2012, pp. 1202-1215.
-
(2012)
Signal Processing
, vol.92
, pp. 1202-1215
-
-
Seyedzadeh, S.M.1
Mirzakuchaki, S.2
-
16
-
-
84857918206
-
A new image encryption scheme based on a chaotic function
-
M. Francois, T. Grosges, D. Barchiesi, and R. Erra, "A new image encryption scheme based on a chaotic function," Signal Processing: Image Communication, Vol. 27, 2012, pp. 249-259.
-
(2012)
Signal Processing: Image Communication
, vol.27
, pp. 249-259
-
-
Francois, M.1
Grosges, T.2
Barchiesi, D.3
Erra, R.4
-
17
-
-
1342306864
-
A symmetric image encryption scheme based on 3D chaotic cat maps
-
G. Chen, Y. Mao, and C. K. Chui, "A symmetric image encryption scheme based on 3D chaotic cat maps," Chaos, Solitons & Fractals, Vol. 21, 2004, pp. 749-761.
-
(2004)
Chaos, Solitons & Fractals
, vol.21
, pp. 749-761
-
-
Chen, G.1
Mao, Y.2
Chui, C.K.3
-
18
-
-
84891604221
-
A novel authentication scheme based on torus automorphism for smart card
-
C. C. Chang, Q. Mao, and H. L. Wu, "A novel authentication scheme based on torus automorphism for smart card," in Proceedings of International Computer Symposium, 2012, pp. 53-60.
-
(2012)
Proceedings of International Computer Symposium
, pp. 53-60
-
-
Chang, C.C.1
Mao, Q.2
Wu, H.L.3
-
20
-
-
0018545449
-
How to share a secret
-
A. Shamir, "How to share a secret," Communications of the ACM, Vol. 22, 1979, pp. 612-613.
-
(1979)
Communications of the ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
21
-
-
0035851424
-
On the torus automorphisms: Analytic solution, computability and quantization
-
P. Akritas, I. E. Antoniou, and G. P. Pronko, "On the torus automorphisms: analytic solution, computability and quantization," Chaos, Solitons and Fractals, Vol. 12, 2001, pp. 2805-2814.
-
(2001)
Chaos, Solitons and Fractals
, vol.12
, pp. 2805-2814
-
-
Akritas, P.1
Antoniou, I.E.2
Pronko, G.P.3
-
22
-
-
1342306864
-
A symmetric image encryption scheme based on 3D chaotic cat maps
-
G. Chen, Y. Mao, and C. Chui, "A symmetric image encryption scheme based on 3D chaotic cat maps," Chaos, Solitons, Fractals, Vol. 21, 2004, pp. 749-761.
-
(2004)
Chaos, Solitons, Fractals
, vol.21
, pp. 749-761
-
-
Chen, G.1
Mao, Y.2
Chui, C.3
-
23
-
-
0000412724
-
Arithmetical properties of strongly chaotic motions
-
I. Percival and F. Vivaldi, "Arithmetical properties of strongly chaotic motions," Physica D: Nonlinear Phenomena, Vol. 25, 1987, pp. 105-130.
-
(1987)
Physica D: Nonlinear Phenomena
, vol.25
, pp. 105-130
-
-
Percival, I.1
Vivaldi, F.2
-
24
-
-
84879527914
-
An image encryption scheme based on concatenated torus automorphisms
-
Q. Mao, C. C. Chang, and H. L. Wu, "An image encryption scheme based on concatenated torus automorphisms," KSII Transactions on Internet and Information Systems, Vol. 7, 2013. pp. 1492-1511.
-
(2013)
KSII Transactions on Internet and Information Systems
, vol.7
, pp. 1492-1511
-
-
Mao, Q.1
Chang, C.C.2
Wu, H.L.3
|