From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Novel Quantum Encryption and Authentication Framework Integrated with IoT., , , и . Security, Privacy and Trust in the IoT Environment, Springer, (2019)Tamper Proofing Identification and Authenticated DICOM Image Transmission Using Wireless Channels and CR Network., , , , , и . Wirel. Pers. Commun., 97 (4): 5573-5595 (2017)Detecting and Mitigating Selfish Primary Users in Cognitive Radio., , , и . Wirel. Pers. Commun., 109 (2): 1021-1031 (2019)Transreceiving of encrypted medical image - a cognitive approach., , , , , , и . Multim. Tools Appl., 77 (7): 8393-8418 (2018)Hybrid spectrum management using integrated fuzzy and femtocells in cognitive domain., , , и . J. Intell. Fuzzy Syst., 41 (6): 6079-6088 (2021)Uncover the cover to recover the hidden secret - A separable reversible data hiding framework., , , и . Multim. Tools Appl., 80 (13): 19695-19714 (2021)ROI-based medical image watermarking for accurate tamper detection, localisation and recovery., , , , и . Medical Biol. Eng. Comput., 59 (6): 1355-1372 (2021)Triple chaotic image scrambling on RGB - a random image encryption approach., , , и . Secur. Commun. Networks, 8 (18): 3335-3345 (2015)Mojette (d) Secret Image "SEDIH" in an Encrypted Double Image - A Histo Approach., , , и . Int. J. Netw. Secur., 19 (1): 47-59 (2017)Image encryption through RNA approach assisted with neural key sequences., , , , , , , и . Multim. Tools Appl., 79 (17-18): 12093-12124 (2020)