Abstract: This paper proposes two level authentication for an image communication through world wide web. The algorithm presented here mainly consist of techniques combined with symmetric key ...
note 1: Small data velocity is a rough evaluation of algorithm's efficiency on small data. For more detailed analysis, please refer to next paragraph. note 2: some algorithms feature faster than RAM ...
As the cybersecurity landscape rapidly evolves, Entrust today announced a landmark achievement: The Entrust nShield Hardware Security Module’s (HSMs) implementation of three NIST standardized ...
Abstract: The sparsity-regularized linear inverse problem has been widely used in many fields, such as remote sensing imaging, image processing and analysis, seismic deconvolution, compressed sensing, ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results