Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 341 matches
- 2024
- Erdal Güvenoglu:
An image encryption algorithm based on multi-layered chaotic maps and its security analysis. Connect. Sci. 36(1) (2024) - Heping Wen, Yiting Lin:
Cryptanalysis of an image encryption algorithm using quantum chaotic map and DNA coding. Expert Syst. Appl. 237(Part B): 121514 (2024) - Chengqing Li, Xianhui Shen, Sheng Liu:
Cryptanalyzing an Image Encryption Algorithm Underpinned by 2-D Lag-Complex Logistic Map. IEEE Multim. 31(1): 99-109 (2024) - Mamoon Riaz, Hammad Dilpazir, Sundus Naseer, Hasan Mahmood, Asim Anwar, Junaid Khan, Ian B. Benitez, Tanveer Ahmad:
Secure and Fast Image Encryption Algorithm Based on Modified Logistic Map. Inf. 15(3): 172 (2024) - Alberto Dennunzio, Enrico Formenti, Luciano Margara:
An efficient algorithm deciding chaos for linear cellular automata over (Z/mZ)n with applications to data encryption. Inf. Sci. 657: 119942 (2024) - Rong Chen, Xiaomeng Li, Lin Teng, Xingyuan Wang:
An image encryption algorithm based on the LSCMM chaotic map and bidirectional dynamic diffusion. Multim. Tools Appl. 83(2): 3681-3706 (2024) - Yingjie Hu, Qiuyu Zhang, Qiwen Zhang, Yujiao Ba:
An intelligent homomorphic audio signal encryption algorithm for secure interacting. Multim. Tools Appl. 83(9): 25675-25693 (2024) - Qingfeng Li, Lei Chen:
An image encryption algorithm based on 6-dimensional hyper chaotic system and DNA encoding. Multim. Tools Appl. 83(2): 5351-5368 (2024) - Ensherah A. Naeem, Anand B. Joshi, Dhanesh Kumar, Fathi E. Abd El-Samie:
Few-detail image encryption algorithm based on diffusion and confusion using Henon and Baker chaotic maps. Soft Comput. 28(4): 2851-2861 (2024) - Yafei Wang, Lin Teng, Xingyuan Wang:
An image encryption algorithm based on circular rotation and generalized Feistel structure. Soft Comput. 28(5): 4335-4358 (2024) - 2023
- Chenchen He, Zhong Chen, Xiyu Sun, Lujie Wang:
An Algorithm Based on Hodgkin-Huxley Model and Latin Square for Image Encryption. IEEE Access 11: 34163-34174 (2023) - Iqtadar Hussain, Amir Anees, Temadher Alassiry Al-Maadeed:
A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group. Comput. Appl. Math. 42(2) (2023) - Shengtao Geng, Jiahao Li, Xuncai Zhang, Yanfeng Wang:
An Image Encryption Algorithm Based on Improved Hilbert Curve Scrambling and Dynamic DNA Coding. Entropy 25(8): 1178 (2023) - Qinmao Jiang, Simin Yu, Qianxue Wang:
Cryptanalysis of an Image Encryption Algorithm Based on Two-Dimensional Hyperchaotic Map. Entropy 25(3): 395 (2023) - Shuqin Zhu, Congxu Zhu, Hanyu Yan:
Cryptanalyzing and Improving an Image Encryption Algorithm Based on Chaotic Dual Scrambling of Pixel Position and Bit. Entropy 25(3): 400 (2023) - Cuiran Li, Jixuan Wu, Zepeng Zhang, Anqi Lv:
Energy-harvesting Q-learning secure routing algorithm with authenticated-encryption for WSN. ICT Express 9(6): 1077-1084 (2023) - Jianeng Tang, Zezong Zhang, Peiyang Chen, Feng Zhang, Hui Ni, Zhongming Huang:
An image layered scrambling encryption algorithm based on a novel discrete chaotic map. IET Image Process. 17(2): 518-532 (2023) - Jiming Zheng, Tianyu Bao:
An image encryption algorithm based on cascade chaotic map and DNA coding. IET Image Process. 17(12): 3510-3523 (2023) - Jiangjian Xu, Bing Zhao:
Designing an Image Encryption Algorithm Based on Hyperchaotic System and DCT. Int. J. Bifurc. Chaos 33(2): 2350021:1-2350021:22 (2023) - Ju Li:
Research on an optimised encryption algorithm for network information security communication. Int. J. Commun. Networks Distributed Syst. 29(1): 31-46 (2023) - Maki Kihara, Satoshi Iriyama:
Security Verification of an Authentication Algorithm Based on Verifiable Encryption. Inf. 14(2): 126 (2023) - Kedar Nath Singh, Amit Kumar Singh:
An Improved Encryption-Compression-based Algorithm for Securing Digital Images. ACM J. Data Inf. Qual. 15(2): 21:1-21:16 (2023) - K. Prabhavathi, M. B. Anandaraju, Kiran:
An efficient medical image encryption algorithm for telemedicine applications. Microprocess. Microsystems 101: 104907 (2023) - Xin Chen, Simin Yu, Qianxue Wang, Christophe Guyeux, Mengjie Wang:
On the cryptanalysis of an image encryption algorithm with quantum chaotic map and DNA coding. Multim. Tools Appl. 82(27): 42717-42737 (2023) - Donghua Jiang, Lidong Liu, Liya Zhu, Xingyuan Wang, Yingpin Chen, Xianwei Rong:
An efficient meaningful double-image encryption algorithm based on parallel compressive sensing and FRFT embedding. Multim. Tools Appl. 82(18): 27337-27363 (2023) - Miguel Ángel Murillo-Escobar, José Alfonso Quintana-Ibarra, César Cruz-Hernández, Rosa Martha López-Gutiérrez:
Biosignal encryption algorithm based on Ushio chaotic map for e-health. Multim. Tools Appl. 82(15): 23373-23399 (2023) - Hesam Omranpour, Zeynab Mohammadi Ledari, Masoumeh Taheri:
Presentation of encryption method for RGB images based on an evolutionary algorithm using chaos functions and hash tables. Multim. Tools Appl. 82(6): 9343-9360 (2023) - Walid El Shafai, Iman M. Almomani, Anees Ara, Aala Alkhayer:
An optical-based encryption and authentication algorithm for color and grayscale medical images. Multim. Tools Appl. 82(15): 23735-23770 (2023) - Madhu Sharma, Ranjeet Kumar Ranjan, Vishal Bharti:
An image encryption algorithm based on a novel hyperchaotic Henon sine map. Multim. Tools Appl. 82(8): 11949-11972 (2023) - Hongwei Xie, Ya-jun Gao, Hao Zhang:
An image encryption algorithm based on novel block scrambling scheme and Josephus sequence generator. Multim. Tools Appl. 82(11): 16431-16453 (2023)
skipping 311 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-18 10:44 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint