共 50 条
- [21] Security analysis of an image encryption algorithm based on a DNA addition combining with chaotic maps Multimedia Tools and Applications, 2014, 72 : 2211 - 2224
- [22] XTEA ENCRYPTION BASED NOVEL RFID SECURITY PROTOCOL 2011 24TH CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (CCECE), 2011, : 58 - 62
- [23] Security analysis of an RFID protocol based on insubvertible encryption Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2012, 49 (05): : 958 - 961
- [24] Application of Compound Chaotic Mapping in Voice Encryption Algorithm INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2014, 14 (08): : 44 - 46
- [26] The Application of Hybrid Encryption Algorithm in Software Security 2013 3RD INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS, COMMUNICATIONS AND NETWORKS (CECNET), 2013, : 669 - 672
- [28] A speech chaotic encryption algorithm based on network 2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 283 - 286
- [29] Image Encryption Algorithm Based on Chaotic Sequence COMMUNICATIONS, SIGNAL PROCESSING, AND SYSTEMS, CSPS 2018, VOL II: SIGNAL PROCESSING, 2020, 516 : 262 - 265
- [30] Image encryption algorithm based on chaotic system 7TH INTERNATIONAL CONFERENCE ON COMPUTER-AIDED INDUSTRIAL DESIGN & CONCEPTUAL DESIGN, 2006, : 767 - 771