Digital Library
Search Results: [ keyword: Security ] (237)
Kai Wang,
Wei Bao,
Yingjie Wang,
Xiangrong Tong,
Vol. 11, No. 9, September 29, 2017
10.3837/tiis.2017.09.025
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Bangyi Sun,
Jianfeng Chu,
Liang Hu,
Hongtu Li,
Guangkun Shi,
Vol. 11, No. 9, September 29, 2017
10.3837/tiis.2017.09.023
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Muhammad Tausif,
Javed Ferzund,
Sohail Jabbar,
Raheela Shahzadi,
Vol. 11, No. 8, August 30, 2017
10.3837/tiis.2017.08.014
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Aly M. El-Semary,
Mohamed Mostafa A. Azim,
Hossam Diab,
Vol. 11, No. 7, July 30, 2017
10.3837/tiis.2017.07.017
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
209.
An Efficient Chaotic Image Encryption Algorithm Based on Self-adaptive Model and Feedback Mechanism
Tahani Gazdar,
Abdelfettah Belghith,
Ahmad AlMogren,
Vol. 11, No. 3, March 30, 2017
10.3837/tiis.2017.03.016
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)