Anti-forensic Approach to Remove StegoContent from Images and Videos. | 0 | 0.34 | 2019 |
Hardware Random Number GeneratorUsing FPGA. | 0 | 0.34 | 2019 |
Exploitation of HTTP/2 Proxies for Cryptojacking. | 0 | 0.34 | 2019 |
The Art of Piecewise Hashing: A StepToward Better Evidence Provability. | 0 | 0.34 | 2018 |
Counting rotation symmetric functions using Polya's theorem | 1 | 0.36 | 2014 |
On the Extensions of (k, n)*-Visual Cryptographic Schemes. | 1 | 0.38 | 2014 |
On the k-error Joint Linear Complexity and Error Multisequence over F q (char F q = p, prime). | 0 | 0.34 | 2014 |
A more efficient and faster pairing computation with cryptographic security | 1 | 0.37 | 2012 |
Reconciliation engine and metric for network vulnerability assessment | 0 | 0.34 | 2012 |