×
Log in
Upload File
Most Popular
Art & Photos
Automotive
Business
Career
Design
Education
Hi-Tech
+ Browse for More
ijcisjournal documents
Technology
ELLIPTIC CURVE CRYPTOGRAPHY IN SECURING NETWORKS BY MOBILE AUTHENTICATION
Documents
A Secure Color Image Steganography in Transform Domain
Technology
A New Method for Preserving Privacy in Data Publishing Against Attribute and Identity Disclosure Risk
Technology
A critical reassessment of
Technology
A novel authenticated cipher for rfid systems
Technology
PERFORMANCE ANALYSIS OF SHA-2 AND SHA-3 FINALISTS
Technology
An efficient algorithm for sequence generation in data mining
Technology
A Secure Color Image Steganography in Transform Domain
Technology
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
Technology
Randomness evaluation framework of cryptographic algorithms
Engineering
Survey on information sharing
Engineering
Automatic tempest test and analysis system
Technology
A PAIRING-FREE IDENTITY BASED TRIPARTITE SIGNCRYPTION SCHEME
Technology
Translation of sign language using generic fourier descriptor and nearest neighbour
Technology
A NEW ATTACK ON RSA WITH A COMPOSED DECRYPTION EXPONENT
Technology
Hardware Implementation of Algorithm for Cryptanalysis
Technology
Design of Mobile Public Key Infrastructure (M-PKI) Using Elliptic Curve Cryptography
Technology
BLIND AND ROBUST IMAGES WATERMARKING BASED ON WAVELET AND EDGE INSERTION
Technology
Secure Image Transfer in The Domain Transform DFT
Technology
An Encryption Algorithm To Evaluate Performance Of V2v Communication In Vanet
Technology
Cryptography from quantum mechanical
Next >