ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Technology
Biology
Mathematics
Medicine / Pharmacology
Chemistry
Research
Pure sciences
Education
Agronomy and forestry
Social Sciences
all records (72)

Languages
English
German
French
Spanish
Portuguese

Countries
Indonesia
USA
Brazil
Italy
Australia
Ukraine
India
Spain
Romania
Iran
all records (73)

Years
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
all records (24)

Filter  
 
4.837  Articles
1 of 485 pages  |  10  records  |  more records»
Recently, to conquer most non-plain related chaos-based image cryptosystems’ security flaws that cannot resist the powerful chosen/knownn plain-text attacks or differential attacks efficiently for less plaintext sensitivity, many plain related chaos... see more

Recently, a variety of chaos-based image encryption algorithms adopting the traditional permutation-diffusion structure have been suggested. Most of these algorithms cannot resist the powerful chosen-plaintext attack and chosen-ciphertext attack efficient... see more

In order to overcome the difficulty of key management in “one time pad” encryption schemes and also resist the attack of chosen plaintext, a new image encryption algorithm based on chaos and SHA-256 is proposed in this paper. The architecture ... see more

Due to the rapid evaluation in the field of communications and multimedia and the increasing use of the Internet, multimedia data security has become very urgent. of the best alternative way to achieve multimedia data security is encryption, which prevent... see more

Due to the rapid evaluation in the field of communications and multimedia and the increasing use of the Internet, multimedia data security has become very urgent. of the best alternative way to achieve multimedia data security is encryption, which prevent... see more

An image encryption algorithm is presented in this paper based on a chaotic map. Different from traditional methods based on the permutation-diffusion structure, the keystream here depends on both secret keys and the pre-processed image. In particular, in... see more

The current research aims to identify the barriers faced by the candidates during the implementation of the e- portfolio in an educational environment. How to implement the e-portfolio at the College of Education, Sultan Qaboos University in light of the ... see more

In this paper we study the cycle descent statistic on permutations. Several involutions on permutations and derangements are constructed. Moreover, we construct a bijection between negative cycle descent permutations and Callan perfect matchings.

Let GG be a graph whose vertices are labeled 1,…,n1,\ldots,n, and p\pi be a permutation on [n]:={1,2,…,n}[n]:=\{1,2,\ldots, n\}. A pebble pip_i that is initially placed at the vertex ii has destination p(i)\pi(i) for each i?[n]i\in [n]. At each step, we c... see more

1 of 485 pages  |  10  records  |  more records»