Format
Sort by
Items per page

Send to

Choose Destination

Links from PubMed

Items: 1 to 20 of 102

1.

Symmetric-Key Encryption Based on Bioaffinity Interactions.

McGoldrick LK, Weiss EA, Halámek J.

ACS Synth Biol. 2019 Jul 19;8(7):1655-1662. doi: 10.1021/acssynbio.9b00164. Epub 2019 Jul 9.

PMID:
31287664
2.

Optical stream-cipher-like system for image encryption based on Michelson interferometer.

Yang B, Liu Z, Wang B, Zhang Y, Liu S.

Opt Express. 2011 Jan 31;19(3):2634-42. doi: 10.1364/OE.19.002634.

PMID:
21369084
3.

Binary-tree encryption strategy for optical multiple-image encryption.

Yi J, Tan G.

Appl Opt. 2016 Jul 10;55(20):5280-91. doi: 10.1364/AO.55.005280.

PMID:
27409301
4.
5.

Optical cryptography with biometrics for multi-depth objects.

Yan A, Wei Y, Hu Z, Zhang J, Tsang PWM, Poon TC.

Sci Rep. 2017 Oct 11;7(1):12933. doi: 10.1038/s41598-017-12946-8.

6.

The Development of a Portable Hard Disk Encryption/Decryption System with a MEMS Coded Lock.

Zhang W, Chen W, Tang J, Xu P, Li Y, Li S.

Sensors (Basel). 2009;9(11):9300-31. doi: 10.3390/s91109300. Epub 2009 Nov 19.

7.

Dynamic video encryption algorithm for H.264/AVC based on a spatiotemporal chaos system.

Xu H, Tong XJ, Zhang M, Wang Z, Li LH.

J Opt Soc Am A Opt Image Sci Vis. 2016 Jun 1;33(6):1166-74. doi: 10.1364/JOSAA.33.001166.

PMID:
27409446
8.

Optical scanning cryptography for secure wireless transmission.

Poon TC, Kim T, Doh K.

Appl Opt. 2003 Nov 10;42(32):6496-503.

PMID:
14650492
9.

Double-random-phase encryption with photon counting for image authentication using only the amplitude of the encrypted image.

Wang Y, Markman A, Quan C, Javidi B.

J Opt Soc Am A Opt Image Sci Vis. 2016 Nov 1;33(11):2158-2165. doi: 10.1364/JOSAA.33.002158.

PMID:
27857432
10.

A Novel Message-Preserving Scheme with Format-Preserving Encryption for Connected Cars in Multi-Access Edge Computing.

Oh I, Kim T, Yim K, Lee SY.

Sensors (Basel). 2019 Sep 7;19(18). pii: E3869. doi: 10.3390/s19183869.

11.

Identity-Based Encryption with Filtered Equality Test for Smart City Applications.

Ming Y, Wang E.

Sensors (Basel). 2019 Jul 10;19(14). pii: E3046. doi: 10.3390/s19143046.

12.

An Identity-Based (IDB) Broadcast Encryption Scheme with Personalized Messages (BEPM).

Xu K, Liao Y, Qiao L, Liu Z, Yang X.

PLoS One. 2015 Dec 2;10(12):e0143975. doi: 10.1371/journal.pone.0143975. eCollection 2015.

13.

Key-space analysis of double random phase encryption technique.

Monaghan DS, Gopinathan U, Naughton TJ, Sheridan JT.

Appl Opt. 2007 Sep 10;46(26):6641-7.

PMID:
17846658
14.

Secure Quaternion Feistel Cipher for DICOM Images.

Dzwonkowski M, Rykaczewski R.

IEEE Trans Image Process. 2019 Jan;28(1):371-380. doi: 10.1109/TIP.2018.2868388. Epub 2018 Sep 3.

PMID:
30183633
15.

Security-enhanced optical voice encryption in various domains and comparative analysis.

Rajput SK, Matoba O.

Appl Opt. 2019 Apr 10;58(11):3013-3022. doi: 10.1364/AO.58.003013.

PMID:
31044906
16.

Medical Image Encryption: An Application for Improved Padding Based GGH Encryption Algorithm.

Sokouti M, Zakerolhosseini A, Sokouti B.

Open Med Inform J. 2016 Oct 28;10:11-22. eCollection 2016.

17.

An image encryption algorithm utilizing julia sets and hilbert curves.

Sun Y, Chen L, Xu R, Kong R.

PLoS One. 2014 Jan 3;9(1):e84655. doi: 10.1371/journal.pone.0084655. eCollection 2014.

18.

Deficiencies of the cryptography based on multiple-parameter fractional Fourier transform.

Ran Q, Zhang H, Zhang J, Tan L, Ma J.

Opt Lett. 2009 Jun 1;34(11):1729-31.

PMID:
19488163
19.

DNA Cryptography and Deep Learning using Genetic Algorithm with NW algorithm for Key Generation.

Kalsi S, Kaur H, Chang V.

J Med Syst. 2017 Dec 5;42(1):17. doi: 10.1007/s10916-017-0851-z.

PMID:
29204890
20.

Ensemble of Chaotic and Naive Approaches for Performance Enhancement in Video Encryption.

Chandrasekaran J, Thiruvengadam SJ.

ScientificWorldJournal. 2015;2015:458272. doi: 10.1155/2015/458272. Epub 2015 Oct 13.

Supplemental Content

Support Center