Hot Keywords
Cyber-physical systems Post-quantum cryptography Public-key cryptography Edge computing Anti-forensics Big data security control selection Attacks on IoT systems Domain Name System DNS attacks Network security Transport layer security protocol

Top
The paper's citation list
No.The paper's citation list
1XOR-Based (n, n) Visual Cryptography Schemes for Grayscale or Color Images with Meaningful Shares. 2022;12:10096 doi: 10.3390/app121910096
© 2016-2023 OAE Publishing Inc., except certain content provided by third parties