Visual Public-Key Cryptosystems.
Many public-key cryptosystems are being used in our daily lives to attain privacy, authenticity, integrity and non-repudiation. However, most of the existing public-key algorithms are based on complex mathematical computations. Until recently, building a highly secured public-key cryptosystem withou...
| Main Author: | Samsudin, Azman |
|---|---|
| Format: | Monograph |
| Language: | English |
| Published: |
Universiti Sains Malaysia
2012
|
| Subjects: | |
| Online Access: | http://eprints.usm.my/37077/ http://eprints.usm.my/37077/1/224e%20Visual%20Public-Key%20Cryptossystems..pdf |
Similar Items
A New Public-Key Cryptosystem Based On Mandelbrot And Julia Fractal Sets.
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
A New Visual Public-Key Cryptosystem Based On Non-Expansion Technique And Boolean Operations
by: Jaafar, Abdullah Mohammed Abdo Ali
Published: (2011)
by: Jaafar, Abdullah Mohammed Abdo Ali
Published: (2011)
A New Approach To Public-Key Cryptosystem Based On Mandelbrot And Julia Fractal Sets.
by: A. Alia, Mohammad Ahmad
Published: (2008)
by: A. Alia, Mohammad Ahmad
Published: (2008)
Multi-Threading Elliptic Curve Cryptosystems.
by: Kanniah, Uma S., et al.
Published: (2007)
by: Kanniah, Uma S., et al.
Published: (2007)
Securing Telecommunication Based On Speaker Voice As The Public Key.
by: Enayah, Monther Rateb, et al.
Published: (2007)
by: Enayah, Monther Rateb, et al.
Published: (2007)
MaTRU: A new NTRU-based cryptosystem
by: Coglianese, , M, et al.
Published: (2005)
by: Coglianese, , M, et al.
Published: (2005)
New Key Exchange Protocol Based on Mandelbrot and Julia Fractal Sets.
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
Stego Keys Performance on Feature Based Coding Method in Text Domain
by: Din, Roshidi, et al.
Published: (2017)
by: Din, Roshidi, et al.
Published: (2017)
Self-Verification Of Public-Key
Agreement Over Voip Using Random
Fusion Scheme
by: Alfin Syafalni, Alfin Syafalni
Published: (2016)
by: Alfin Syafalni, Alfin Syafalni
Published: (2016)
Zot-Binary: A New Number System And Its Application On Number Theory Based Public-Key Cryptography
by: Jahani, Shahram
Published: (2016)
by: Jahani, Shahram
Published: (2016)
Two Novel E-Visas Verification Schemes Based On
Public Key Infrastructure (Pki) And Identity Based
Encryption (Ibe).
by: Abuadhmah, Najlaa Abdullah
Published: (2010)
by: Abuadhmah, Najlaa Abdullah
Published: (2010)
CDS505 – Data Visualization & Visual Analytics
(Visualisasi Data & Analitik Visual)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
CDS505 – Data Visualization & Visual Analytics (Data Visualisasi & Analitik Visual)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2023)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2023)
Visualizing Phylogenetic Trees: Algorithms And Visual Comparison Techniques
by: Wan Zainon, Wan Mohd Nazmee
Published: (2011)
by: Wan Zainon, Wan Mohd Nazmee
Published: (2011)
CDS505 – Data Visualization & Visual Analytics - February 2022
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2022)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2022)
Computation of cryptographic keys from face biometrics
by: Goh,, A, et al.
Published: (2003)
by: Goh,, A, et al.
Published: (2003)
CMT324 – COMPUTER GRAPHICS & VISUAL COMPUTING [GRAFIK KOMPUTER & PERKOMPUTERAN VISUAL]
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2017)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2017)
CDS505 - Data Visualization & Visual Analytics (December 2019 / January 2020)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2020)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2020)
CMT324 – Computer Graphics & Visual Computing (Grafik Komputer & Perkomputeran Visual)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
Personalised cryptographic key generation based on FaceHashing
by: TEOH, A
Published: (2004)
by: TEOH, A
Published: (2004)
A novel key release scheme from biometrics
by: Song, , Ong Thian, et al.
Published: (2006)
by: Song, , Ong Thian, et al.
Published: (2006)
Generation of replaceable cryptographic keys from dynamic handwritten signatures
by: Yip, , WK, et al.
Published: (2006)
by: Yip, , WK, et al.
Published: (2006)
A Visual Approach For Requirement Traceability
by: Madaki, Abdulkadir Ahmad
Published: (2022)
by: Madaki, Abdulkadir Ahmad
Published: (2022)
CPC354 – Computer Graphics & Visualization (Grafik Komputer & Visualisasi) CMT324 - Computer Graphics and Visual Computing (Grafik Komputer dan Perkomputeran Visual) - February/March 2022
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2022)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2022)
CMT324 – COMPUTER GRAPHICS & VISUAL COMPUTING [GRAFIK KOMPUTER & PERKOMPUTERAN VISUAL] DEC. 2014 - JAN. 2015
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2015)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2015)
CMT324 – COMPUTER GRAPHICS & VISUAL COMPUTING [GRAFIK KOMPUTER & PERKOMPUTERAN VISUAL] DEC. 2015 - JAN. 2016
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2016)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2016)
Cryptographic keys from dynamic hand-signatures with biometric secrecy preservation and replaceability
by: Kuan, , YW, et al.
Published: (2005)
by: Kuan, , YW, et al.
Published: (2005)
Cryptanalysis of the n-party encrypted Diffie-Hellman key exchange using different passwords
by: Phan, Raphael Chung Wei, et al.
Published: (2006)
by: Phan, Raphael Chung Wei, et al.
Published: (2006)
Unreliable Network Re-Authentication Protocol Based On Hybrid Key Using CSP Approach.
by: Ramadass, Sureswaran, et al.
Published: (2007)
by: Ramadass, Sureswaran, et al.
Published: (2007)
A key distribution scheme for secure multicast over IPv6 wireless networks
by: Aye, Win, Win, et al.
Published: (2005)
by: Aye, Win, Win, et al.
Published: (2005)
Knowledge discovery through composited visualization, navigation and retrieval
by: Lim, Wei-Ching, et al.
Published: (2005)
by: Lim, Wei-Ching, et al.
Published: (2005)
CMT324 - COMPUTER GRAPHIC & VISUAL GRAPHIC JANUARY 2012
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2012)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2012)
CMT 315 - GRAFIK KOMPUTER & PERKOMPUTERAN VISUAL MEI 05.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2005)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2005)
CMT315 - GRAFIK KOMPUTER & PERKOMPUTERAN VISUAL MAC 05.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2005)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2005)
CMT315 - GRAFK KOMPUTER & PERKOMPUTERAN VISUAL MEI 05
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2005)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2005)
CMT 315 - COMPUTER GRAPHICS & VISUAL COMPUTING OKT 04
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2004)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2004)
CMT315 – GRAFIK KOMPUTER & PERKOMPUTERAN VISUAL APRIL 2004
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2004)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2004)
CPM303 – GRAFIK KOMPUTER & PERKOMPUTERAN VISUAL APRIL 2002
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2002)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2002)
CPM303 – GRAFIK KOMPUTER & PEKOMPUTERAN VISUAL - APR. 2002
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2002)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2002)
CMT315 – GRAFIK KOMPUTER & PERKOMPUTERAN VISUAL - MEI 2005
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2005)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2005)
Similar Items
-
A New Public-Key Cryptosystem Based On Mandelbrot And Julia Fractal Sets.
by: Alia, Mohammad Ahmad, et al.
Published: (2007) -
A New Visual Public-Key Cryptosystem Based On Non-Expansion Technique And Boolean Operations
by: Jaafar, Abdullah Mohammed Abdo Ali
Published: (2011) -
A New Approach To Public-Key Cryptosystem Based On Mandelbrot And Julia Fractal Sets.
by: A. Alia, Mohammad Ahmad
Published: (2008) -
Multi-Threading Elliptic Curve Cryptosystems.
by: Kanniah, Uma S., et al.
Published: (2007) -
Securing Telecommunication Based On Speaker Voice As The Public Key.
by: Enayah, Monther Rateb, et al.
Published: (2007)