共 50 条
- [21] Selective image encryption scheme based on DWT, AES S-box and chaotic permutation 2015 INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2015, : 606 - 610
- [23] Blockchain-based tamper-proof and transparent investigation model for cloud VMs The Journal of Supercomputing, 2022, 78 : 17891 - 17919
- [25] Blockchain-Based Sharing and Tamper-Proof Framework of Big Data Networking IEEE NETWORK, 2020, 34 (04): : 62 - 67
- [26] Blockchain-based tamper-proof and transparent investigation model for cloud VMs JOURNAL OF SUPERCOMPUTING, 2022, 78 (16): : 17891 - 17919
- [27] An Efficient Image Encryption Scheme Based on: Henon Map, Skew Tent Map and S-Box 2015 6TH INTERNATIONAL CONFERENCE ON MODELING, SIMULATION, AND APPLIED OPTIMIZATION (ICMSAO), 2015,
- [30] Image encryption based on chaotic map and dynamic S-box 2013 INTERNATIONAL SYMPOSIUM ON INTELLIGENT SIGNAL PROCESSING AND COMMUNICATIONS SYSTEMS (ISPACS), 2013, : 435 - 439