Linked e-resources

Details

A Score Level Fusion Method for Protecting Fingerprint and Palmprint Templates
Combining Human Ear and Profile Face Biometrics for Identity Recognition
Computation And Communication Efficient Chinese Remainder Theorem Based Multi-Party Key Generation Using Modified RSA
Efficient Random Grid Visual Cryptographic Schemes having Essential Members
Further results on bent-negabent Boolean functions
Generalization of Lattice Based Cryptography on Hypercomplex Algebras
Health Monitoring of Hydraulic System Using Feature based Multivariate Time-series Classification Model
Image Security using Hyperchaos and Multidimensional Playfair Cipher
Iris recognition using improved Xor-Sum Code
Linear Complementary Dual Codes over $mathbb{Z}_2mathbb{Z}_4$
Low c-differential uniformity for the Gold function modified on a subfield
Post-Quantum Secure Identity Based Encryption from Multivariate Public Key Cryptography
Provably insecure group authentication Not all security proofs are what they claim to be
Terahertz Communication Merit Demerit and Future challenges regarding 6G Wireless Networks.

Browse Subjects

Show more subjects...

Statistics

from
to
Export