Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference46 articles.
1. Abd El-Latif AA, Abd-El-Atty B, Elseuofi S, Khalifa HS, Alghamdi AS, Polat K, Amin M (2020) Secret images transfer in cloud system based on investigating quantum walks in steganography approaches. Physica A: Statistical Mechanics and its Applications 541:123687
2. Al-Nofaie S, Gutub A, Al-Ghamdi M (2019) Enhancing Arabic text steganography for personal usage utilizing pseudo-spaces. Journal of King Saud University - Computer and Information Sciences
3. Anand S, Perumal V (2019) EECDH to prevent MITM attack in cloud computing. Digit Commun Netw 5(4):276–287
4. Asahiro Y, Jansson J, Lin G, Miyano E, Ono H, Utashima T (2020) Exact algorithms for the repetition-bounded longest common subsequence problem. Theor Comput Sci 838:238–249
5. Bhowmick R, Sadek Bhuiyan MI, Sabir Hossain M, Hossen MK, Sadee Tanim A (2019) An approach for improving complexity of longest common subsequence problems using queue and divide-and-conquer method. In: 2019 1st international conference on advances in science, engineering and robotics technology (ICASERT), pp 1–5
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献