1 |
Linguistic Based One Time Password
|
2023 |
|
2 |
Activity Attribute-Based User Behavior Model for C...
|
2023 |
|
3 |
Authentication Scheme using Honey Sentences
|
2023 |
|
4 |
Improving ANiTW Performance Using Bigrams Characte...
|
2023 |
|
5 |
Linguistic-based One Time Password
|
2023 |
|
6 |
Protecting Author Royalty of Digital Assets Using ...
|
2022 |
|
7 |
Bimodal Keystroke Dynamics-Based Authentication fo...
|
2022 |
|
8 |
Blockchain-based Smart Parking System using Ring L...
|
2022 |
|
9 |
Column-Level Database Encryption Using Rijndael Al...
|
2022 |
|
10 |
Strengthening INORMALS Using Context-based Natural...
|
2022 |
|
11 |
Improving the Efficiency and Security of Dynamic Q...
|
2022 |
|
12 |
Improving the Imperceptibility of Pixel Value Diff...
|
2021 |
|
13 |
Strengthening the Security and Preserving User Ano...
|
2021 |
|
14 |
Strengthening the Security of Deniable Authenticat...
|
2021 |
|
15 |
Increasing The Capacity of Headstega Based on Bitw...
|
2021 |
|
16 |
Grid-based Image Encryption using Code-based Crypt...
|
2020 |
|
17 |
Improving data hiding capacity in Code Based Stega...
|
2020 |
|
18 |
Improving the Performance of Blockchain Based Digi...
|
2020 |
|
19 |
Paraphrasing Method Based on Contextual Synonym Su...
|
2020 |
|
20 |
Increasing the Capacity of Listega Based on Syllab...
|
2018 |
|
21 |
Information Hiding Based on Histogram and Pixel Pa...
|
2018 |
|
22 |
Overcoming Alignment Problem in Non-Identical Math...
|
2018 |
|
23 |
Permutation Modification of Reversible Data Hiding...
|
2018 |
|
24 |
Strengthening Fawkescoin Against Double Spending A...
|
2018 |
|
25 |
Digital Contract Using Block Chaining and Elliptic...
|
2018 |
|
26 |
Modifikasi Headstega berdasarkan Penyisipan Karakt...
|
2017 |
|
27 |
Preserving Forward Anonymity on Dynamic ID based R...
|
2017 |
|
28 |
Strengthening Dynamic Identity Based Remote User A...
|
2017 |
|
29 |
Denying collision in the second round of Keccak Ha...
|
2016 |
|
30 |
Detecting Visual Spoofing Using Classical Cryptana...
|
2016 |
|
31 |
Exploiting the error correction mechanism in QR co...
|
2016 |
|
32 |
Improving NORMALS Using Modified Baudot-Murray Cod...
|
2016 |
|
33 |
Increasing Secret Data Hiding Capacity in QR Code ...
|
2016 |
|
34 |
Linguistic Based Steganography Using Lexical Subst...
|
2016 |
|
35 |
Modified Graphstega Based on Chart Scale Modificat...
|
2016 |
|
36 |
Visual authentication based on visual cryptography...
|
2016 |
|
37 |
An automatic Health Surveillance Chart Interpretat...
|
2015 |
|
38 |
Improving Bio-Cryptography Authentication Protocol
|
2015 |
|
39 |
List Steganography Based on Syllable Patterns
|
2015 |
|
40 |
Strengthening Crypto-1 Cipher Against Algebraic At...
|
2015 |
|
41 |
Watermarking QR Code
|
2015 |
|
42 |
A Visual One-Time Password Authentication Scheme U...
|
2014 |
|
43 |
Non-Relevant Document Reduction in Anti-Plagiarism...
|
2014 |
|
44 |
Web crawler utilization for resource search on Ind...
|
2013 |
|
45 |
Comparison Between Fingerprint and Winnowing Algor...
|
2013 |
|
46 |
Kombinasi N-Gram Token Based dan Dice Coefficient ...
|
2013 |
|
47 |
Malaria Incidence Forecasting from Incidence Recor...
|
2013 |
|
48 |
Performing Chart interpretation Using Lexical Sele...
|
2013 |
|
49 |
Strengthening Dynamic Cell Spreading (DCS) image s...
|
2013 |
|
50 |
Web Crawler Utilization for Resource Search on Ind...
|
2013 |
|
51 |
Securing Elliptic Curve Based El-Gamal Against Pol...
|
2012 |
|
52 |
Pendeteksian dan Perbaikan Citra Termanipulasi yan...
|
2010 |
|
53 |
Pendeteksian dan Perbaikan Citra Termanipulasi yan...
|
2010 |
|
54 |
MODIFIKASI VIDEO ENCRYPTON ALGORITHM UNTUK MENINGK...
|
2008 |
|
55 |
Conference Key Agreement Protocol Using Oblivious ...
|
2002 |
|
56 |
Generating Shared RSA Parameters for Two Communica...
|
2000 |
|
57 |
A Proposal for Generating Shared RSA Parameters
|
1999 |
|
58 |
Group Public Key Agreement Protocol
|
1999 |
|
59 |
Public Key Agreement Protocol
|
1999 |
|
60 |
Robust Protocol for Generating Shared RSA Paramete...
|
1999 |
|
61 |
Augmented Encrypted Key Exchange Using RSA Encrypt...
|
1998 |
|
62 |
Mofidied Conference Key Agreement Protocol
|
1998 |
|
63 |
Augmented Encrypted Key Exchange using RSA Encrypt...
|
1997 |
|