Some Graph-Based Encryption Schemes
In today’s technological world, confidentiality is an important issue to deal with, and it is carried out through different proficiencies. Cryptography is a scientific technique of securing a communication from unauthenticated approach. There exist many encryption algorithms in cryptography for data...
Saved in:
Main Authors: | Baizhu Ni, Rabiha Qazi, Shafiq Ur Rehman, Ghulam Farid |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2021-01-01
|
Series: | Journal of Mathematics |
Online Access: | http://dx.doi.org/10.1155/2021/6614172 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Inequalities for a Unified Integral Operator via α,m-Convex Functions
by: Baizhu Ni, et al.
Published: (2020-01-01) -
Lattice‐based unidirectional Proxy Re‐Encryption and Proxy Re‐Encryption+ schemes
by: Kunwar Singh, et al.
Published: (2021-01-01) -
An Integrated Image Encryption Scheme Based on Elliptic Curve
by: Ijaz Khalid, et al.
Published: (2023-01-01) -
A Layered Searchable Encryption Scheme with Functional Components Independent of Encryption Methods
by: Guangchun Luo, et al.
Published: (2014-01-01) -
Multi-key fully homomorphic encryption scheme based on NTRU bootstrapping
by: ZHENG Junhua, et al.
Published: (2024-12-01)