共 50 条
- [21] Password-based encryption analyzed [J]. AUTOMATA, LANGUAGES AND PROGRAMMING, PROCEEDINGS, 2005, 3580 : 664 - 676
- [22] Password secured sites - Stepping forward with keystroke dynamics [J]. International Conference on Next Generation Web Services Practices, 2005, : 293 - 298
- [23] Password Authentication with Secured Login Interface at Application Layer [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2014, 14 (09): : 82 - 85
- [24] Password Typos Resilience in Honey Encryption [J]. 2017 31ST INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2017, : 593 - 598
- [25] A study on secured encryption of medical images using significant visual cryptography [J]. ENGINEERING RESEARCH EXPRESS, 2024, 6 (02):
- [26] Speech encryption using chaotic shift keying for secured speech communication [J]. EURASIP Journal on Audio, Speech, and Music Processing, 2017
- [27] A Highly Secured Image Encryption Scheme using Quantum Walk and Chaos [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 73 (01): : 657 - 672
- [28] Reducing packet loss in CBC secured VoIP using interleaved encryption [J]. 2006 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-5, 2006, : 1406 - +
- [29] Speech encryption using chaotic shift keying for secured speech communication [J]. EURASIP JOURNAL ON AUDIO SPEECH AND MUSIC PROCESSING, 2017,
- [30] Secured Privacy Data using Multi Key Encryption in Cloud Storage [J]. PROCEEDINGS OF 2018 FIFTH INTERNATIONAL CONFERENCE ON EMERGING APPLICATIONS OF INFORMATION TECHNOLOGY (EAIT), 2018,