Skip to search formSkip to main contentSkip to account menu

Encryption

Known as: Encryption algorithms, List of ciphers, Encryption and decryption 
In cryptography, encryption is the process of encoding messages or information in such a way that only authorized parties can read it. Encryption… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2015
Review
2015
MANET routing is critical and routing decision should be made sooner before the node leaves the network. Fast decisions always… 
2013
2013
The traffic of digital images and video has grown rapidly in the internet. Security becomes important for several applications… 
Highly Cited
2013
Highly Cited
2013
Encryption is used to securely transmit data in open networks. Each type of data has its own features; therefore different… 
Review
2012
Review
2012
Image encryption is vital to ensure confidential transmission and storage of images over internet. However a real-time image… 
Highly Cited
2010
Highly Cited
2010
Mobile devices with global positioning capabilities allow users to retrieve points of interest (POI) in their proximity. To… 
Highly Cited
2009
Highly Cited
2009
Wireless ad hoc networks have fundamentally altered today's battlefield, with applications ranging from unmanned air vehicles to… 
Highly Cited
2005
Highly Cited
2005
Background TheData Encryption Standard (DES) [] has been around for more than  years. During this time, the standard was… 
Highly Cited
2005
Highly Cited
2005
This paper presents a new watermarking framework, suitable for authentication of H.264 compressed videos. The authentication data… 
Highly Cited
2004
Highly Cited
2004
Steganography has been proposed as a methodology for transmitting messages through innocuous covers to conceal their existence… 
Highly Cited
1989
Highly Cited
1989
Abstract : Crystalline complexes of 1,10-dichloro-1,10-distannabicyclo.8. 8hexacosane and benzyltriphenylphosphonium chloride…