Image encryption a communication perspective / Fathi E. Abd El-Samie ... [et al]. a communication perspective /
Saved in:
Other Authors: | Abd el-Samie, Fathi E. |
---|---|
Format: | eBook |
Language: | English |
Published: |
Boca Raton, [Florida] :
CRC Press, Taylor & Francis Group,
2014.
|
Subjects: | |
Online Access: | https://www.vlebooks.com/vleweb/product/openreader?id=LBORO&isbn=9781466576995 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Loading…
Multimedia content encryption : techniques and applications / Shiguo Lian.
by: Lian, Shiguo
Published: (2009)
by: Lian, Shiguo
Published: (2009)
Loading…
Multimedia encryption and authentication techniques and applications / editors in chief and Authors Borko Furht, Darko Kirovski.
Published: (2006)
Published: (2006)
Loading…
Codes, cryptology, and information security : first International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015, Proceedings : in honor of Thierry Berger / Said El Hajji, Abderrahmane Nitaj, Claude Carlet, El Mamoun Souidi (eds.).
Published: (2015)
Published: (2015)
Loading…
Theory and practice of cryptography solutions for secure information systems Atilla Elçi ... [et al.], editors.
Published: (2013)
Published: (2013)
Loading…
Encryption of images file using a user controlled automatically-generated key
by: Halima Abdul halime Shnishah, et al.
Published: (2018)
by: Halima Abdul halime Shnishah, et al.
Published: (2018)
Loading…
Malicious attack propagation and source identification / Jiaojiao Jiang, Sheng Wen, Bo Liu, Shui Yu, Yang Xiang, Wanlei Zhou.
by: Jiang, Jiaojiao, et al.
Published: (2019)
by: Jiang, Jiaojiao, et al.
Published: (2019)
Loading…
Wireless communications security : solutions for the internet of things / Jyrki T.J. Penttinen.
by: Penttinen, Jyrki T. J.
Published: (2017)
by: Penttinen, Jyrki T. J.
Published: (2017)
Loading…
Cryptography and network security : principles and practice / William Stallings.
by: Stallings, William
Published: (2011)
by: Stallings, William
Published: (2011)
Loading…
Automatic selective encryption of DICOM images
by: Qamar Natsheh, et al.
Published: (2023)
by: Qamar Natsheh, et al.
Published: (2023)
Loading…
Group theoretic cryptography / Maria Isabel Gonzalez Vasco, Rainer Steinwandt.
by: Gonzalez Vasco, Maria Isabel, et al.
Published: (2015)
by: Gonzalez Vasco, Maria Isabel, et al.
Published: (2015)
Loading…
Group theoretic cryptography Maria Isabel González Vasco, Rainer Steinwandt.
by: Vasco, Maria Isabel González, et al.
Published: (2015)
by: Vasco, Maria Isabel González, et al.
Published: (2015)
Loading…
Introduction to identity-based encryption / Luther Martin.
by: Martin, Luther
Published: (2008)
by: Martin, Luther
Published: (2008)
Loading…
Wireless mobile internet security / Man Young Rhee, Endowed Chair Professor, Kyung Hee University, Professor Emeritus, Hanyang University, Republic of Korea.
by: Rhee, Man Young
Published: (2013)
by: Rhee, Man Young
Published: (2013)
Loading…
Wi-Foo : [the secrets of wireless hacking] / Andrew A.Vladimirov, Konstantin V. Gavrilenko, Andrei A. Mikhailovsky.
by: Vladimirov, Andrew A.
Published: (2004)
by: Vladimirov, Andrew A.
Published: (2004)
Loading…
Cryptography and network security principles and practice / William Stallings.
by: Stallings, William
Published: (2014)
by: Stallings, William
Published: (2014)
Loading…
Cryptography and network security : principles and practice / William Stallings.
by: Stallings, William, et al.
Published: (2014)
by: Stallings, William, et al.
Published: (2014)
Loading…
Cryptography and network security principles and practices / William Stallings.
by: Stallings, William
Published: (2017)
by: Stallings, William
Published: (2017)
Loading…
Cryptography and network security : principles and practice / William Stallings.
by: Stallings, William
by: Stallings, William
Loading…
Privacy-preserving blockchain based IoT ecosystem using attribute-based encryption
by: Yogachandran Rahulamathavan, et al.
Published: (2018)
by: Yogachandran Rahulamathavan, et al.
Published: (2018)
Loading…
Next generation wireless network security and privacy / Kamaljit I. Lakhtaria, editor.
Published: (2015)
Published: (2015)
Loading…
Wireless networks and security issues, challenges and research trends / edited by Shafiullah Khan and Al-Sakib Khan Pathan.
Published: (2013)
Published: (2013)
Loading…
Wireless network security / [edited by] Yang Xiao, Xuemin Shen and Ding-Zhu Du.
Published: (2007)
Published: (2007)
Loading…
Encryption of text file using a user controlled automatically-generated key
by: Halima Shnishah, et al.
Published: (2019)
by: Halima Shnishah, et al.
Published: (2019)
Loading…
Mobile communication systems and security / Man Young Rhee.
by: Rhee, Man Young
Published: (2009)
by: Rhee, Man Young
Published: (2009)
Loading…
Cryptography for dummies / by Chey Cobb.
by: Cobb, Chey
Published: (2004)
by: Cobb, Chey
Published: (2004)
Loading…
Wireless next generation networks : a virtue-based trust model / Michael G. Harvey.
by: Harvey, Michael G.
Published: (2014)
by: Harvey, Michael G.
Published: (2014)
Loading…
Business continuity and disaster recovery planning for IT professionals / Susan Snedaker, Chris Rima.
by: Snedaker, Susan, et al.
Published: (2014)
by: Snedaker, Susan, et al.
Published: (2014)
Loading…
Seven deadliest wireless technologies attacks / Brad Haines ; technical editor, Tim Kramer.
by: Haines, Brad
Published: (2010)
by: Haines, Brad
Published: (2010)
Loading…
Data-driven security analysis, visualization and dashboards / Jay Jacobs and Bob Rudis.
by: Jacobs, Jay
Published: (2014)
by: Jacobs, Jay
Published: (2014)
Loading…
Strategic and practical approaches for information security governance technologies and applied solutions / Manish Gupta, John Walp, Raj Sharman, editors.
Published: (2012)
Published: (2012)
Loading…
Information security journal A global perspective.
Loading…
Wireless crime and forensic investigation / Gregory Kipper.
by: Kipper, Gregory
Published: (2007)
by: Kipper, Gregory
Published: (2007)
Loading…
CNN for user activity detection using encrypted in-app mobile data
by: Omattage Madushi H. Pathmaperuma, et al.
Published: (2022)
by: Omattage Madushi H. Pathmaperuma, et al.
Published: (2022)
Loading…
Medical image encryption using chaotic map improved advanced encryption standard
by: Ranvir S. Bhogal, et al.
Published: (2018)
by: Ranvir S. Bhogal, et al.
Published: (2018)
Loading…
The security risk assessment handbook a complete guide for performing security risk assessments / Douglas J. Landoll.
by: Landoll, Douglas J.
Published: (2005)
by: Landoll, Douglas J.
Published: (2005)
Loading…
Computer security handbook / Richard H. Baker.
by: Baker, Richard H.
Published: (1991)
by: Baker, Richard H.
Published: (1991)
Loading…
Privacy and security for cloud computing / Siani Pearson, George Yee, editors.
Published: (2013)
Published: (2013)
Loading…
Mathematics of data/image coding, compression, and encryption : 21-22 July 1998, San Diego, California / Mark S. Schmalz, chair/editor ; sponsored ... by SPIE--the International Society for Optical Engineering.
Published: (1998)
Published: (1998)
Loading…
Codes : the guide to secrecy from ancient to modern times / Richard A. Mollin.
by: Mollin, Richard A., 1947-
Published: (2005)
by: Mollin, Richard A., 1947-
Published: (2005)
Loading…
Protect your privacy : the PGP user's guide / William Stallings.
by: Stallings, William
Published: (1995)
by: Stallings, William
Published: (1995)
Similar Items
-
Multimedia content encryption : techniques and applications / Shiguo Lian.
by: Lian, Shiguo
Published: (2009) -
Multimedia encryption and authentication techniques and applications / editors in chief and Authors Borko Furht, Darko Kirovski.
Published: (2006) -
Codes, cryptology, and information security : first International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015, Proceedings : in honor of Thierry Berger / Said El Hajji, Abderrahmane Nitaj, Claude Carlet, El Mamoun Souidi (eds.).
Published: (2015) -
Theory and practice of cryptography solutions for secure information systems Atilla Elçi ... [et al.], editors.
Published: (2013) -
Encryption of images file using a user controlled automatically-generated key
by: Halima Abdul halime Shnishah, et al.
Published: (2018)