[1]
|
Enhancing medical data security using tiny encryption algorithm and least significant bit steganography
CONFERENCE ON MATHEMATICAL SCIENCES AND APPLICATIONS IN ENGINEERING: CMSAE-2021,
2023
DOI:10.1063/5.0149166
|
|
|
[2]
|
Cybersecurity challenges in the healthcare domain and theroad ahead
CONFERENCE ON MATHEMATICAL SCIENCES AND APPLICATIONS IN ENGINEERING: CMSAE-2021,
2023
DOI:10.1063/5.0149167
|
|
|
[3]
|
Breaking Data Encryption Standard with a Reduced Number of Rounds Using Metaheuristics Differential Cryptanalysis
Entropy,
2021
DOI:10.3390/e23121697
|
|
|
[4]
|
Breaching Security of Full Round Tiny Encryption Algorithm
International Journal of Information Security and Privacy,
2018
DOI:10.4018/IJISP.2018010108
|
|
|
[5]
|
Quantum Genetic Algorithms for Computer Scientists
Computers,
2016
DOI:10.3390/computers5040024
|
|
|
[6]
|
E-Business and Telecommunications
Communications in Computer and Information Science,
2014
DOI:10.1007/978-3-662-44788-8_17
|
|
|
[7]
|
Proceedings of the Third International Conference on Soft Computing for Problem Solving
Advances in Intelligent Systems and Computing,
2014
DOI:10.1007/978-81-322-1771-8_71
|
|
|
[8]
|
E-Business and Telecommunications
Communications in Computer and Information Science,
2014
DOI:10.1007/978-3-662-44788-8_17
|
|
|
[9]
|
Proceedings of the Third International Conference on Soft Computing for Problem Solving
Advances in Intelligent Systems and Computing,
2014
DOI:10.1007/978-81-322-1771-8_71
|
|
|
[10]
|
Security Protocols XXI
Lecture Notes in Computer Science,
2013
DOI:10.1007/978-3-642-41717-7_26
|
|
|
[11]
|
An evolutionary computation attack on one-round TEA
Procedia Computer Science,
2011
DOI:10.1016/j.procs.2011.08.033
|
|
|