Cloud computing in cryptography and steganography
From MaRDI portal
Recommendations
Cites work
- scientific article; zbMATH DE number 3688714 (Why is no real title available?)
- scientific article; zbMATH DE number 44104 (Why is no real title available?)
- Design of data format converters using two-dimensional register allocation
- Distributed systems. Principles and paradigms.
- Fully homomorphic encryption using ideal lattices
- Probabilistic encryption
Cited in
(7)- Using CAPTCHA in computer steganography
- Scalable and robust cryptography approach using cloud computing
- New models and methods for estimating the cryptographic strength of information security systems
- Algorithms for solving problems of cryptographic protection of color image pixels in the Rademacher's basis and residue number systems
- Editorial: Cryptography and data security in cloud computing
- Using the cloud to determine key strengths
- Review of contemporary information-theoretical approaches to solving of main cryptography and steganography problems
This page was built for publication: Cloud computing in cryptography and steganography
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q466404)