×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents of ijcisjournal
ELLIPTIC CURVE CRYPTOGRAPHY IN SECURING NETWORKS BY MOBILE AUTHENTICATION
286 views
A Secure Color Image Steganography in Transform Domain
15 views
A New Method for Preserving Privacy in Data Publishing Against Attribute and Identity Disclosure Risk
879 views
A critical reassessment of
87 views
A novel authenticated cipher for rfid systems
167 views
PERFORMANCE ANALYSIS OF SHA-2 AND SHA-3 FINALISTS
703 views
An efficient algorithm for sequence generation in data mining
331 views
A Secure Color Image Steganography in Transform Domain
1.178 views
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
1.623 views
Randomness evaluation framework of cryptographic algorithms
407 views
Survey on information sharing
61 views
Automatic tempest test and analysis system
81 views
A PAIRING-FREE IDENTITY BASED TRIPARTITE SIGNCRYPTION SCHEME
241 views
Translation of sign language using generic fourier descriptor and nearest neighbour
194 views
A NEW ATTACK ON RSA WITH A COMPOSED DECRYPTION EXPONENT
369 views
Hardware Implementation of Algorithm for Cryptanalysis
346 views
Design of Mobile Public Key Infrastructure (M-PKI) Using Elliptic Curve Cryptography
1.103 views
BLIND AND ROBUST IMAGES WATERMARKING BASED ON WAVELET AND EDGE INSERTION
337 views
Secure Image Transfer in The Domain Transform DFT
415 views
An Encryption Algorithm To Evaluate Performance Of V2v Communication In Vanet
833 views
Next >