Author:
Bhardwaj Archana,Chaudhary Shikha,Sharma Vijay Kumar
Reference16 articles.
1. Dalvi, G.D., Wakde, D.G.: Facial images authentication in visual cryptography using sterilization algorithm. In: 2nd International Conference for Convergence in Technology (I2CT) (2017)
2. Agrawal, E., Pal, P.R.: A new and more authentic cryptographic based approach for securing short message. Int. J. Adv. Res. Comput. Sci. 8 (2017)
3. Kumari, S.: A research paper on cryptography encryption and compression techniques. Int. J. Eng. Comput. Sci. IJECS 6 (2017)
4. Agrawal, A., Patankar, G.: Design of hybrid cryptography algorithm for secure communication. Int. Res. J. Eng. Technol. IRJET 3 (2016)
5. Gençoğlu, M.T.: Mathematical cryptanalysis of personalized information encryption using ECG signals with chaotic functions. In: 2017 International Conference on Computer Science and Engineering (UBMK), Antalya (2017)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献