Some Graph-Based Encryption Schemes
In today’s technological world, confidentiality is an important issue to deal with, and it is carried out through different proficiencies. Cryptography is a scientific technique of securing a communication from unauthenticated approach. There exist many encryption algorithms in cryptography for data...
Saved in:
Main Authors: | Baizhu Ni, Rabiha Qazi, Shafiq Ur Rehman, Ghulam Farid |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2021-01-01
|
Series: | Journal of Mathematics |
Online Access: | http://dx.doi.org/10.1155/2021/6614172 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Inequalities for a Unified Integral Operator via α,m-Convex Functions
by: Baizhu Ni, et al.
Published: (2020-01-01) -
A robust encrypted traffic identification scheme based on graph neural network
by: LI Mengxiang, et al.
Published: (2024-06-01) -
Lattice‐based unidirectional Proxy Re‐Encryption and Proxy Re‐Encryption+ schemes
by: Kunwar Singh, et al.
Published: (2021-01-01) -
Efficient revocable attribute-based encryption scheme
by: Xuejun LI, et al.
Published: (2019-06-01) -
Identity authentication scheme based on identity-based encryption
by: Ren-ji HUANG, et al.
Published: (2016-06-01)