ACM SIGSAC Review
Theory and Applications of Cellular Automata in Cryptography
IEEE Transactions on Computers
Blocking Sets in (v,{ 2, 4}, 1)-Designs
Designs, Codes and Cryptography
Search Key Substitution in the Encipherment of B-Trees
VLDB '90 Proceedings of the 16th International Conference on Very Large Data Bases
An Interactive Cryptanalysis Algorithm for the Vigenere Cipher
ADVIS '00 Proceedings of the First International Conference on Advances in Information Systems
EurAsia-ICT '02 Proceedings of the First EurAsian Conference on Information and Communication Technology
A Flexible User Authentication Scheme for Multi-server Internet Services
ICN '01 Proceedings of the First International Conference on Networking-Part 1
Efficient selective encryption for JPEG 2000 images using private initial table
Pattern Recognition
High-performance JPEG steganography using complementary embedding strategy
Pattern Recognition
Lethargy results in LTI System Modelling
Automatica (Journal of IFAC)
Hi-index | 0.01 |