Cited By
View all- Talhaoui MWang ZMidoun MSmaili AMekkaoui DLablack MZhang K(2024)Vulnerability Detection and Improvements of an Image Cryptosystem for Real-Time Visual ProtectionACM Transactions on Multimedia Computing, Communications, and Applications10.1145/370854621:3(1-23)Online publication date: 14-Dec-2024
- Mamdouh EAlexan WEl-Damak DAshraf FGabr M(2024)Augmented Image Encryption via Moore’s Automaton and Jigsaw Transform2024 Panhellenic Conference on Electronics & Telecommunications (PACET)10.1109/PACET60398.2024.10497045(1-6)Online publication date: 28-Mar-2024
- Chowdhury KDeb SRoy KPodder DSahu A(2024)A Systematic Survey on TPE Schemes for the Cloud: Classification, Challenges, and Future ScopesIEEE Access10.1109/ACCESS.2024.347922812(160669-160689)Online publication date: 2024
- Show More Cited By