Alexopoulos, Bourbakis and Ioannou proposed two cryptographic schemes for encrypting 2-D gray scale images by using a large family of fractals respectively. Their schemes are based on a transposition of the image elements. However, their schemes will be vulnerable in case that they employ the unique
β¦ LIBER β¦
On the implementation of security policies with adaptative encryption
β Scribed by Antonio Izquierdo Manzanares; Jose M. Sierra Camara; Joaquin Torres Marquez
- Book ID
- 108100576
- Publisher
- Elsevier Science
- Year
- 2006
- Tongue
- English
- Weight
- 491 KB
- Volume
- 29
- Category
- Article
- ISSN
- 0140-3664
No coin nor oath required. For personal study only.
π SIMILAR VOLUMES
On the security of image encryption meth
β
Jan Jinn-Ke; Tseng Yuh-Min
π
Article
π
1996
π
Elsevier Science
π
English
β 457 KB
On the security of the WinRAR encryption
β
Gary S.-W. Yeo; Raphael C.-W. Phan
π
Article
π
2006
π
Springer-Verlag
π
English
β 470 KB
On the security of multiple Huffman tabl
β
Qing Zhou; Kwok-wo Wong; Xiaofeng Liao; Yue Hu
π
Article
π
2011
π
Elsevier Science
π
English
β 289 KB
Comments on the security of Chenβs authe
β
Mohamed Rasslan; Amr Youssef
π
Article
π
2011
π
Elsevier Science
π
English
β 169 KB
Chen (Computers and Electrical Engineering, vol. 30, 2004) illustrated that Tseng et al.'s authenticated encryption schemes, with message linkages for message flows, do not achieve their claimed integrity and authenticity properties. Furthermore, Chen presented some modified schemes to repair these
Adaptively secure identity-based broadca
β
Leyou Zhang; Yupu Hu; Qing Wu
π
Article
π
2012
π
Elsevier Science
π
English
β 222 KB
Enactment and Implementation of the Nati
β
Douglas A. Brook; Cynthia L. King
π
Article
π
2011
π
John Wiley and Sons
π
English
β 567 KB