Item request has been placed! ×
Item request cannot be made. ×
loading  Processing Request
Item request has been placed! ×
Item request cannot be made. ×
loading  Processing Request
Academic Journal

Caveat Implementor! Key Recovery Attacks on MEGA

  • Source: Albrecht , M , Haller , M , Mareková , L & Paterson , K 2023 , Caveat Implementor! Key Recovery Attacks on MEGA . in C Hazay & M Stam (eds) , Advances in Cryptology – EUROCRYPT 2023 - 42nd Annual

تفاصيل العنوان

×
Academic Journal

A Spin Glass Model for Reconstructing Nonlinearly Encrypted Signals Corrupted by Noise

Subjects: Inference; Signal reconstruction; Spin glass

  • Source: Fyodorov , Y V 2019 , ' A Spin Glass Model for Reconstructing Nonlinearly Encrypted Signals Corrupted by Noise ' , Journal of Statistical Physics , vol. 175 , no. 5 , pp. 789-818 .

تفاصيل العنوان

×
Academic Journal

A Spin Glass Model for Reconstructing Nonlinearly Encrypted Signals Corrupted by Noise

Subjects: Inference; Signal reconstruction; Spin glass

  • Source: Fyodorov , Y V 2019 , ' A Spin Glass Model for Reconstructing Nonlinearly Encrypted Signals Corrupted by Noise ' , Journal of Statistical Physics , vol. 175 , no. 5 , pp. 789-818 .

تفاصيل العنوان

×
Academic Journal

State Department cipher machines and communications security in the early Cold War, 1944-1965

Subjects: State Department; CIA; KGB

  • Source: Easter , D 2023 , ' State Department cipher machines and communications security in the early Cold War, 1944-1965 ' , Intelligence and National Security . https://doi.org/10.1080/02684527.2023.2269512

تفاصيل العنوان

×
Academic Journal

Hiding patients’ medical reports using an enhanced wavelet steganography algorithm in DICOM images

Subjects: Image steganography; Integer wavelet transform; Medical images

  • Source: Ahmad , M A , Elloumi , M , Samak , A H , Al-Sharafi , A M , Alqazzaz , A , Kaid , M A & Iliopoulos , C 2022 , ' Hiding patients’ medical reports using an enhanced wavelet steganography algorithm in

تفاصيل العنوان

×
Academic Journal

Intelligent Bio-Latticed Cryptography: A Quantum-Proof Efficient Proposal

  • Source: Althobaiti , O , Mahmoodi , T & Dohler , M 2022 , ' Intelligent Bio-Latticed Cryptography: A Quantum-Proof Efficient Proposal ' , Symmetry , vol. 14 , no. 11 . https://doi.org/10.3390/sym14112351

تفاصيل العنوان

×
Academic Journal

Hiding patients’ medical reports using an enhanced wavelet steganography algorithm in DICOM images

Subjects: Image steganography; Integer wavelet transform; Medical images

  • Source: Ahmad , M A , Elloumi , M , Samak , A H , Al-Sharafi , A M , Alqazzaz , A , Kaid , M A & Iliopoulos , C 2022 , ' Hiding patients’ medical reports using an enhanced wavelet steganography algorithm in

تفاصيل العنوان

×
Academic Journal

GIFT-Cloud:A data sharing and collaboration platform for medical imaging research

Subjects: Anonymisation; Biomedical research; Cross-disciplinary research

  • Source: Doel , T , Shakir , D I , Pratt , R , Aertsen , M , Moggridge , J , Bellon , E , David , A L , Deprest , J , Vercauteren , T & Ourselin , S 2017 , ' GIFT-Cloud : A data sharing and collaboration

تفاصيل العنوان

×
Academic Journal

GIFT-Cloud:A data sharing and collaboration platform for medical imaging research

Subjects: Anonymisation; Biomedical research; Cross-disciplinary research

  • Source: Doel , T , Shakir , D I , Pratt , R , Aertsen , M , Moggridge , J , Bellon , E , David , A L , Deprest , J , Vercauteren , T & Ourselin , S 2017 , ' GIFT-Cloud : A data sharing and collaboration

تفاصيل العنوان

×
Academic Journal

Network Traffic Classification Techniques and Challenges

Subjects: Machine Learning (ML); network traffic analysis; security

  • Source: Al Khater , N & Overill , R E 2016 , Network Traffic Classification Techniques and Challenges . in The 10th International Conference on Digital Information Management, ICDIM 2015 . , 7381869 , pp.

تفاصيل العنوان

×
  • 1-10 ل  12 نتائج ل ""Encryption""