| 1 |
Linguistic Based One Time Password
|
2023 |
|
| 2 |
Activity Attribute-Based User Behavior Model for C...
|
2023 |
|
| 3 |
Authentication Scheme using Honey Sentences
|
2023 |
|
| 4 |
Improving ANiTW Performance Using Bigrams Characte...
|
2023 |
|
| 5 |
Linguistic-based One Time Password
|
2023 |
|
| 6 |
Protecting Author Royalty of Digital Assets Using ...
|
2022 |
|
| 7 |
Bimodal Keystroke Dynamics-Based Authentication fo...
|
2022 |
|
| 8 |
Blockchain-based Smart Parking System using Ring L...
|
2022 |
|
| 9 |
Column-Level Database Encryption Using Rijndael Al...
|
2022 |
|
| 10 |
Strengthening INORMALS Using Context-based Natural...
|
2022 |
|
| 11 |
Improving the Efficiency and Security of Dynamic Q...
|
2022 |
|
| 12 |
Improving the Imperceptibility of Pixel Value Diff...
|
2021 |
|
| 13 |
Strengthening the Security and Preserving User Ano...
|
2021 |
|
| 14 |
Strengthening the Security of Deniable Authenticat...
|
2021 |
|
| 15 |
Increasing The Capacity of Headstega Based on Bitw...
|
2021 |
|
| 16 |
Grid-based Image Encryption using Code-based Crypt...
|
2020 |
|
| 17 |
Improving data hiding capacity in Code Based Stega...
|
2020 |
|
| 18 |
Improving the Performance of Blockchain Based Digi...
|
2020 |
|
| 19 |
Paraphrasing Method Based on Contextual Synonym Su...
|
2020 |
|
| 20 |
Increasing the Capacity of Listega Based on Syllab...
|
2018 |
|
| 21 |
Information Hiding Based on Histogram and Pixel Pa...
|
2018 |
|
| 22 |
Overcoming Alignment Problem in Non-Identical Math...
|
2018 |
|
| 23 |
Permutation Modification of Reversible Data Hiding...
|
2018 |
|
| 24 |
Strengthening Fawkescoin Against Double Spending A...
|
2018 |
|
| 25 |
Digital Contract Using Block Chaining and Elliptic...
|
2018 |
|
| 26 |
Modifikasi Headstega berdasarkan Penyisipan Karakt...
|
2017 |
|
| 27 |
Preserving Forward Anonymity on Dynamic ID based R...
|
2017 |
|
| 28 |
Strengthening Dynamic Identity Based Remote User A...
|
2017 |
|
| 29 |
Denying collision in the second round of Keccak Ha...
|
2016 |
|
| 30 |
Detecting Visual Spoofing Using Classical Cryptana...
|
2016 |
|
| 31 |
Exploiting the error correction mechanism in QR co...
|
2016 |
|
| 32 |
Improving NORMALS Using Modified Baudot-Murray Cod...
|
2016 |
|
| 33 |
Increasing Secret Data Hiding Capacity in QR Code ...
|
2016 |
|
| 34 |
Linguistic Based Steganography Using Lexical Subst...
|
2016 |
|
| 35 |
Modified Graphstega Based on Chart Scale Modificat...
|
2016 |
|
| 36 |
Visual authentication based on visual cryptography...
|
2016 |
|
| 37 |
An automatic Health Surveillance Chart Interpretat...
|
2015 |
|
| 38 |
Improving Bio-Cryptography Authentication Protocol
|
2015 |
|
| 39 |
List Steganography Based on Syllable Patterns
|
2015 |
|
| 40 |
Strengthening Crypto-1 Cipher Against Algebraic At...
|
2015 |
|
| 41 |
Watermarking QR Code
|
2015 |
|
| 42 |
A Visual One-Time Password Authentication Scheme U...
|
2014 |
|
| 43 |
Non-Relevant Document Reduction in Anti-Plagiarism...
|
2014 |
|
| 44 |
Web crawler utilization for resource search on Ind...
|
2013 |
|
| 45 |
Comparison Between Fingerprint and Winnowing Algor...
|
2013 |
|
| 46 |
Kombinasi N-Gram Token Based dan Dice Coefficient ...
|
2013 |
|
| 47 |
Malaria Incidence Forecasting from Incidence Recor...
|
2013 |
|
| 48 |
Performing Chart interpretation Using Lexical Sele...
|
2013 |
|
| 49 |
Strengthening Dynamic Cell Spreading (DCS) image s...
|
2013 |
|
| 50 |
Web Crawler Utilization for Resource Search on Ind...
|
2013 |
|
| 51 |
Securing Elliptic Curve Based El-Gamal Against Pol...
|
2012 |
|
| 52 |
Pendeteksian dan Perbaikan Citra Termanipulasi yan...
|
2010 |
|
| 53 |
Pendeteksian dan Perbaikan Citra Termanipulasi yan...
|
2010 |
|
| 54 |
MODIFIKASI VIDEO ENCRYPTON ALGORITHM UNTUK MENINGK...
|
2008 |
|
| 55 |
Conference Key Agreement Protocol Using Oblivious ...
|
2002 |
|
| 56 |
Generating Shared RSA Parameters for Two Communica...
|
2000 |
|
| 57 |
A Proposal for Generating Shared RSA Parameters
|
1999 |
|
| 58 |
Group Public Key Agreement Protocol
|
1999 |
|
| 59 |
Public Key Agreement Protocol
|
1999 |
|
| 60 |
Robust Protocol for Generating Shared RSA Paramete...
|
1999 |
|
| 61 |
Augmented Encrypted Key Exchange Using RSA Encrypt...
|
1998 |
|
| 62 |
Mofidied Conference Key Agreement Protocol
|
1998 |
|
| 63 |
Augmented Encrypted Key Exchange using RSA Encrypt...
|
1997 |
|