Digital Library
Search Results: [ keyword: Network Security ] (25)
Kai Wang,
Wei Bao,
Yingjie Wang,
Xiangrong Tong,
Vol. 11, No. 9, September 29, 2017
10.3837/tiis.2017.09.025
10.3837/tiis.2017.09.025
Aly M. El-Semary,
Mohamed Mostafa A. Azim,
Hossam Diab,
Vol. 11, No. 7, July 30, 2017
10.3837/tiis.2017.07.017
10.3837/tiis.2017.07.017
13.
An Efficient Chaotic Image Encryption Algorithm Based on Self-adaptive Model and Feedback Mechanism
Gang Xiong,
Yuxiang Hu,
Julong Lan,
Guozhen Cheng,
Vol. 10, No. 8, August 30, 2016
10.3837/tiis.2016.08.016
10.3837/tiis.2016.08.016
Khan Muhammad,
Jamil Ahmad,
Haleem Farman,
Zahoor Jan,
Muhammad Sajjad,
Sung Wook Baik,
Vol. 9, No. 5, May 30, 2015
10.3837/tiis.2015.05.022
10.3837/tiis.2015.05.022
Yoney Kirsal-Ever,
Agozie Eneh,
Orhan Gemikonakli,
Leonardo Mostarda,
Vol. 8, No. 12, December 30, 2014
10.3837/tiis.2014.12.021
10.3837/tiis.2014.12.021