Hot Keywords
Cyber-physical systems Post-quantum cryptography Public-key cryptography Edge computing Anti-forensics Big data security control selection Attacks on IoT systems Domain Name System DNS attacks Network security Transport layer security protocol

The paper's citation list
No.The paper's citation list
1XOR-Based (n, n) Visual Cryptography Schemes for Grayscale or Color Images with Meaningful Shares. 2022;12:10096 doi: 10.3390/app121910096
© 2016-2023 OAE Publishing Inc., except certain content provided by third parties