eCite Digital Repository

Items where Subject is Field of Research, Information and Computing Sciences, Cybersecurity and privacy, Cryptography

Journal Article
De Oliveira Albuquerque, R and Garcia Villalba, LJ and Sandoval Orozco, AL and Buiati, F and Kim, TH, A layered trust information security architecture, Sensors, 14, (12) pp. 22754-22772. ISSN 1424-8220 (2014) [Refereed Article]
Kim, T-H, Applying encryption schemed to supervisory control and data acquisition systems for security management, African Journal of Business Management, 7, (24) pp. 2342-2351. ISSN 1993-8233 (2013) [Refereed Article]
Grobler, TL and van Zyl, AJ and Olivier, JC and Kleynhans, W and Salmon, BP and Penzhorn, WT, Wu's algorithm and its possible application in cryptanalysis, African Journal of Mathematics and Computer Science Research, 5, (1) pp. 1-8. ISSN 2006-9731 (2012) [Refereed Article]
Lee, T and Yeom, SJ and Bang, Y and Seo, C, On the encryption techniques for digital right management of MPEG-5 video, Far East Journal of Applied Mathematics, 36, (3) pp. 367-378. ISSN 0972-0960 (2009) [Refereed Article]
Jamil, T, Steganography: The Art of Hiding Information in Plain Sight, IEEE Potentials, 18, (1) pp. 10-12. ISSN 0278-6648 (1999) [Professional, Non Refereed Article] 
Conference Publication
Bhattacharyya, D and Kim, TH and Lee, G-S, Watermarking using multiresolution cosine transformation: a review, Communications in Computer and Information Science 260: Proceedings of the 2011 International Conference on Signal Processing, Image Processing and Pattern Recognition, 8-10 December 2011, Jeju Island, South Korea, pp. 126-139. ISBN 978-3-642-27182-3 (2011) [Refereed Conference Paper] 
Hartnett, JS, Why One Signing Key is Not Enough, HIC2003 RACGP12CC Handbook of Abstracts, 10-12 August 2003, Darling Harbour Sydney Australia EJ ISBN 0 9751013 0 7 (2003) [Conference Extract] 

This list was generated on Tue May 11 10:18:50 2021.