Funder
National Natural Science Foundation of China
the Password Theory Project of the 13th Five-Year Plan National Cryptography Development Fund
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference34 articles.
1. Al-Sharif S, Iqbal F, Baker T, et al. White-hat hacking framework for promoting security awareness. 2016 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS) IEEE, 2016: 1–6
2. Asim M, Yautsiukhin A, Brucker AD et al (2018) Security policy monitoring of BPMN-based service compositions. Journal of Software: Evolution and Process 30(9):e1944
3. Assad SE, Farajallah M (2016) A new chaos-based image encryption system. Signal Process Image Commun 41:144–157
4. Bakhshandeh A, Eslami Z (2013) An authenticated image encryption scheme based on chaotic maps and memory cellular automata. Optics & Lasers in Engineering 51(6):665–673
5. Cao X, Du L, Wei X et al (2016) High capacity reversible data hiding in encrypted images by patch-level sparse representation. IEEE transactions on cybernetics 46(5):1132–1143
Cited by
24 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献