Digital Library
Search Results: [ keyword: Network Security ] (25)
Kai Wang,
Wei Bao,
Yingjie Wang,
Xiangrong Tong,
Vol. 11, No. 9, September 29, 2017
10.3837/tiis.2017.09.025
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Aly M. El-Semary,
Mohamed Mostafa A. Azim,
Hossam Diab,
Vol. 11, No. 7, July 30, 2017
10.3837/tiis.2017.07.017
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
13.
An Efficient Chaotic Image Encryption Algorithm Based on Self-adaptive Model and Feedback Mechanism
Gang Xiong,
Yuxiang Hu,
Julong Lan,
Guozhen Cheng,
Vol. 10, No. 8, August 30, 2016
10.3837/tiis.2016.08.016
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Khan Muhammad,
Jamil Ahmad,
Haleem Farman,
Zahoor Jan,
Muhammad Sajjad,
Sung Wook Baik,
Vol. 9, No. 5, May 30, 2015
10.3837/tiis.2015.05.022
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Yoney Kirsal-Ever,
Agozie Eneh,
Orhan Gemikonakli,
Leonardo Mostarda,
Vol. 8, No. 12, December 30, 2014
10.3837/tiis.2014.12.021
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)