151 | -- | 161 | George Hatzivasilis, George Floros, Ioannis Papaefstathiou, Charalampos Manifavas. Lightweight authenticated encryption for embedded on-chip systems |
162 | -- | 179 | Rafik Hamza, Faiza Titouna. A novel sensitive image encryption algorithm based on the Zaslavsky chaotic map |
180 | -- | 190 | Vishnu Venukumar, Vinod Pathari. A survey of applications of threshold cryptography - proposed and practiced |
191 | -- | 196 | Milad Taleby Ahvanooey, Hassan Dana Mazraeh, Seyed Hashem Tabasi. An innovative technique for web text watermarking (AITW) |
197 | -- | 212 | Anupam Kumar Bairagi, Rahamatullah Khondoker, Rafiqul Islam. An efficient steganographic approach for protecting communication in the Internet of Things (IoT) critical infrastructures |
213 | -- | 234 | D. C. Mishra, R. K. Sharma. An approach for security of color image data in coordinate, geometric, and frequency domains |
235 | -- | 246 | R. Ranjith Kumar, S. Jayasudha, S. Pradeep. Efficient and secure data hiding in encrypted images: A new approach using chaos |
247 | -- | 260 | Davneet Kaur, Sheetal Kalra. Five-tier barrier anti-phishing scheme using hybrid approach |
261 | -- | 279 | Vedrana Krivokuca, Waleed H. Abdulla. Noninvertible fingerprint transforms: Categorization of design mechanisms and discussion of evaluation techniques |
280 | -- | 294 | Zhiying Wang, Nianxin Wang, Xiang Su, Shilun Ge. Differentiated management strategies on cloud computing data security driven by data value |