Tags
cryptography
encryption
cryptographic protocols
cryptography and information security
security
cryptography and coding
decryption
information security
steganography
privacy
authentication
watermarking
intrusion detection system
quantum cryptography
watermark
• algorithms and bioinformatic
medical images
advanced topics in software en
data mining
elliptic curve cryptography
big data
untraceability
transformers
text generation
support vector machines
singular value
direct torque control
private key
vector control
• ai algorithms • artificial i
rns
tel
algorithms and bioinformatics
hhb
hb
lpn
bb84
confidentiality
algorithms
signcryption
e-cash
routing
data privacy
dynamic range
access controls
reverse converter
auditory cryptography
information
permutation
healthcare data management
quantum mechanics
iot e-health
hardware attack
sql injection
cover- image
validity period
digital certificates
privacy-preserving
smart grids
multimedia security
hardware attack mitigation
bioinformatics
glcm
cybercrimes
trust management
compromising emanations
pid control
access control
malware generation
identity management
visual
threshold cryptography
secret-message
gpt
electronics
internet of things (iot)
blockchain technology
quantum resistant cryptography
meta-heuristics
fingerprint
middletext
randomization
cyber-security
copyright
communication network architec
software security
chosen plaintext attack
integral attack
brushless motors
lsb steganography
electric vehicle
machine learning
steganalysis
feature extraction
smart card
arduino
paillier cryptosystem
keccak
²µ°ùø²õ³Ù±ô
forward converter
user authentication
e- commerce
password authentication
optimization
internet of things
cyberspace
robustness
cryptography and information security
• cryptographic protocols
blockchain
• cryptography and coding
rsa
cryptanalysis
man-in-the
su
attacks
• cryptographic protocols • cr
asymmetric cryptography
public key
symmetric cryptography
ai algorithms ï‚· artificial int
key size
cryptocurrency wallet
denial-of-service attack
mobile authentication
ofdm
speech processing
general kalman filter and em algorithm
knn classifier.
speech enhancement
speaker identification
excess mean-square error
trajectory recognition algorithm
nnlms
cardiac output
inertial sensor
e-government services
examination server
framework
educational system
vswr
return loss
double swastika slot antenna.
ppg
sms
at commands.
3g shield
phemt
power amplifier
mic
zigbee
xbee
wireless sensor network
precision agriculture.
heterogeneity
hadoop
mapreduce
hbase
mobile communication
r language
fault detection & outlier
nodes
wallace tree
wireless sensor networks (wsn)
folded tree
linear discriminant analysis
gesture trajectories
svm
fake currency detection
dwt.
cbir
svd and lbp.
classification
rough sets
power law descriptor.
segmentation
homogeneity
texture
clustering
fuzzy sets
soft sets
multi class svm
accumulated cell average- constant false alarm rat
side scan sonar (sss)
watershed and undecimated discrete wavelet transfo
two-dimensional object detection
active contour
pls
pca
avtm.
gait analysis
gei
feature selection
sgmosfet
cmos
dgmosfet
transmission gate
gdi
predictive technology.
multi-speaker activity detection
zero crossing rate.
wavelet decomposition
region growing
seed block
canny edge detection
feed forward neural network
fundus images
texture features
glaucoma
wavelet transform
iop
pca.
multi-focus image integration
swt
fusion
detection rate
cmfd
svm classifier
quantization index modulation (qim)
discrete wavelet transform (dwt)
double density dwt (dddwt) and dual tree dwt (dtdw
digital image
chinese remainder theorem
pearson correlation coefficient
joint adaptive normalisation
normalised bivariate histograms
spearman rank correlation
laplacian of gaussian
gradient magnitude
dct
candidate generation
sequential pattern
gsp
spade
projection based.
prefixspan
minimum_support
nonlinear systems; reduced-order control; global s
image processing
sign language
k-nearest neighbour
generic fourier descriptor
symmetric encryption algorithm
rfid systems
fuzzy set
decomposition
histogram deviation
nist statistical test suite
camellia
lex
randomness tests
tea
simplified data encryption standard
genetic algorithm
bell’s theorem
quantum cryptography (qc)
quantum key distribution (qkd)
wireless sensor networks (wsns)
benevolent node
malicious node
tempest test system.
cryptography and coding untraceability
set protocol
mobile adhoc networks (manets)
vehicle –to-infrastructure (v2i).
intelligent transport system (its)
vehicular adhoc networks (vanets)
vehicle-to-vehicle (v2v)
privacy preservation
data publishing.
generalization
anonymization
suppression
skein
sha-2
sha-3 finalists
jh
hash functions
blake
bmp image file
bmp image file
lsb steganography
multimedia
wavelet
edge
false base station attack
message en route attack
ellipticcurve cryptosystems.
factorization
coppersmith's method
lll algorithm
privacy preserving
information hiding
rsa algorithm
ascii(american standard code for information inter
binary number systems
java language.
multi-dimensional
multi-level
sctp
redundant number systems
lsb steganalysis
bit - plane decomposition
time
phase
intensity
single stage protocol & compact coding
three stage protocol
saturation attack
light-weight block cipher
wlan/wimax
fractal geometry
circular fractal antenna
slotted ground plane
coplanar feed
clipping techniques
hpa
papr
mb ofdm
soft errors
error correction codes.
fir filters
secure examination
authentication.
qr barcode
online information security.
block size. aes
shared secret key.
scrum
project management
agile development
test
software
penetration
multiplication
lai–massey scheme
round function
round keys
block
multiplicative inverse
feystel network
output transformation
subblock
addition
encryption algorithm
additive inverse
photon number splitting attack
man-in-the-middle attack
quantum key distribution
multi-stage protocol
intercept-resend attack
digital multi-signature
group signature
elliptic curve discrete logarithm problem
hash function
noise immune design
cloud-computing
video surveillance
signal processing
networking
iot-enabled
signal processing for iot
cryptosystem
machine learning.
security engineering
data integrity
cryptographic
data security
5g and networks for big data
big data mining
telemedicine
harris
stenography
wireless sensor networks
quantum cryptograph
algorithm
communication
visual cryptograph
symmetric
: identity management · indust
methodology
performance analysis
dwt
´Ú±è²µ²¹â€™s
ycbcr
security threat
sql attack
substitution
recognition
biometrics
zero knowledge
homomorphic encryption
pandemic emergency
privacy trade-off
post quantum cryptography
ntru encrypt
ntru
cipher image
dct compression
selective encryption
cloud erp
crt
secret sharing scheme (sss)
decription
mathematical cryptology
network protocols
balance
• web engineering
• quality management
• knowledge-based systems
• software engineering
cloud computing
virtualization
knowledge processing
embedded system and software
policy management
key recovery attack
active attacks
side channel attack
somewhat homomorphic
cipher-text attack
encoder attack
partially homomorphic
fully homomorphic
artificial immune systems
with
tripartite
• authentication and non-repud
software architecture and desi
• trust management • quantum c
generalized sign
cryptographic protocols ï‚· cr
user aut
key si
key management
applied cryptography
security management
cryptograp
text steganography
cryptographic protocols ï‚· cryp
virtual pas
bigdata
blind key encryption
seed phrase
indexed arrays
logic gates
ant algorithm
visual cryptography
voter card processor
vvpat
ballot unit
control unit
evm
mobile app
encrypted qr code
cyber-terrorists
information and communication
data & system integrity
did
verifiable random function
post-quantum cryptography
ntru lattice
ring-lwe
cyberterrorists
and communication
access control.
organizational model
smart factory
industry 4.0
generative pre-trained transfo
pre-trained transformers
generative
parameter
imperceptibility
capacity
e-payment
• communication network archit
re
secret
• biomedical engineering
• bioinformatics
• ai algorithms
blockch
selective
asymmetric cryptograph
smart meters
• computer education
• algorithms
computational intelligence in
advanced control systems & str
man-in-the-middle
linkable ring signature
eer
multi-modal biometrics
frr
minutiae
iris
blowfish
far
advantage and limitation of quantum cryptography
photon
polarization filter
algebraic degree
algebraic normal form
present
rectangle
ns2
block cipher
stream cipher
amplification of micro displacement
wagneto strictive effect
• e- commerce
control systems (
instrumentation and control systems
trojan severity
trojan detection effectiveness
hardware trojan identification
hardware trojan detection
trojan risk
• fuzzy systems
hardware security
covert attack & overt attack
cbc
sp-network
s-box
hamming distance
inl(integral non linearity)
dnl (differential non linearity)
current source
binary weighted
ripple carry adder
modelsim simulator
test vectors
two-stage operational amplifier
complementary metal-oxide-semiconductor (cmos)
multi-objective genetic algorithm (moga).
analog design
faults dectection
simulation distance measurement eudiean distance a
xor-based conditional keeper
pseudo-footless clock data pre-charge dynamic matc
content addressable memory (cam) circuit
ternary content addressable memory (tcam)circuit
fuzzy logic.
c++
tcl
sobel
ise design suite 14.2
verilog
canny
carry select adder
area-efficient
digit-serial
redundant basis.
finite field multiplication
multiplexing
mentor graphics tools.
fft processor
power.
current steering
bilinear pairing
protocols
phishing
game theory
pell’s equation
scalar multiplication
public key cryptography
a pillar automobile industry
blind spot
vehicle
camouflage technology
stealth technology
electronics and instrumentation engineering
optimization and optimal control
network based systems
instrumentation and control components
timestamp
nash
mobile ad hoc
theory of games
modelling
reputation
cross section analysis
cyber security policy
comparative study
cyber security strategy
cyber security
hybrid systems
artificial intelligence
decision support systems
xor-cascade encryption
lightweight protocol
mac
iot
combining classifiers
time-series shapelets
tests statistics
leverage points
outliers
lad regression
internal model controller
stability analysis
direct synthesis method
integrating systems
simc rules
kharitonov’s theorem
double integrating plus time delay
level control in cylindrical tank.
giant magneto strictive effect
converse piezoelectric effect
photo strictive effect
ilc
adaptive control
batch reactor
induction motor control
adaptive hystresis controller
internal model
model free adaptive control
yaw control
unmanned-aerial-vehicle helicopter
closed loop system
control design
labview
systems tool kit
aircraft mission planning line-of-sight
navigation guidance and control
control system
aircrafts
convolutional encoder design.
See more
Users being followed by ijcisjournal