Visual cryptography

Results: 37



#Item
1Issues in Informing Science and Information Technology  Volume 7, 2010 A Novel Visual Cryptography Coding System for Jam Resistant Communication

Issues in Informing Science and Information Technology Volume 7, 2010 A Novel Visual Cryptography Coding System for Jam Resistant Communication

Add to Reading List

Source URL: leemon.com

Language: English - Date: 2016-06-20 01:24:06
    2Robert L. Bogue MS MVP, MCSE, MCSA:SecurityCoding Options for

    Robert L. Bogue MS MVP, MCSE, MCSA:SecurityCoding Options for

    Add to Reading List

    Source URL: www.thorprojects.com

    Language: English - Date: 2015-07-23 13:04:56
    3Techniques for Visual Feedback of Security State Tara Whalen and Kori Inkpen Dalhousie University Halifax, NS, Canada {whalen, inkpen}@cs.dal.ca Introduction and Overview

    Techniques for Visual Feedback of Security State Tara Whalen and Kori Inkpen Dalhousie University Halifax, NS, Canada {whalen, inkpen}@cs.dal.ca Introduction and Overview

    Add to Reading List

    Source URL: dimacs.rutgers.edu

    Language: English
    4VCK: the Visual Cryptography Kit Frank Stajano Olivetti Oracle Research Laboratory & University of Cambridge Computer Laboratory The idea of visual cryptography is a fascinating invention by Moni Naor and Adi Shamir (199

    VCK: the Visual Cryptography Kit Frank Stajano Olivetti Oracle Research Laboratory & University of Cambridge Computer Laboratory The idea of visual cryptography is a fascinating invention by Moni Naor and Adi Shamir (199

    Add to Reading List

    Source URL: legacy.python.org

    Language: English - Date: 2006-05-04 17:09:08
    5Usability of Augmented Reality for Revealing Secret Messages to Users but Not Their Devices Sarah J. Andrabi Michael K. Reiter

    Usability of Augmented Reality for Revealing Secret Messages to Users but Not Their Devices Sarah J. Andrabi Michael K. Reiter

    Add to Reading List

    Source URL: www.usenix.org

    Language: English - Date: 2016-02-21 12:56:51
    6SAVVIcode: Preventing Mafia Attacks on Visual Code Authentication Schemes (Short Paper) Jonathan Millican and Frank Stajano ,  University of Cambridge Computer Laboratory, Cambr

    SAVVIcode: Preventing Mafia Attacks on Visual Code Authentication Schemes (Short Paper) Jonathan Millican and Frank Stajano , University of Cambridge Computer Laboratory, Cambr

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    Language: English - Date: 2015-07-13 10:08:14
    74-Colored Visual Cryptography Schemes with High Contrast Miyuki Uno1⋆ , Yukiko Ishibashi, and Mikio Kano2 ⋆⋆

    4-Colored Visual Cryptography Schemes with High Contrast Miyuki Uno1⋆ , Yukiko Ishibashi, and Mikio Kano2 ⋆⋆

    Add to Reading List

    Source URL: gorogoro.cis.ibaraki.ac.jp

    Language: English - Date: 2012-02-10 02:39:05
      8Cryptographic Voting Protocols: A Systems Perspective Chris Karlof Naveen Sastry David Wagner {ckarlof, nks, daw}@cs.berkeley.edu University of California, Berkeley

      Cryptographic Voting Protocols: A Systems Perspective Chris Karlof Naveen Sastry David Wagner {ckarlof, nks, daw}@cs.berkeley.edu University of California, Berkeley

      Add to Reading List

      Source URL: naveen.ksastry.com

      Language: English - Date: 2013-06-08 15:25:46
      9THE ART AND SCIENCE OF SSL VALIDATION: A VISUAL REFERENCE GUIDE SO WHAT LEVEL OF SSL WORKS BEST FOR YOU? READ ON TO DISCOVER THIS AND MORE. DV LEVEL 1

      THE ART AND SCIENCE OF SSL VALIDATION: A VISUAL REFERENCE GUIDE SO WHAT LEVEL OF SSL WORKS BEST FOR YOU? READ ON TO DISCOVER THIS AND MORE. DV LEVEL 1

      Add to Reading List

      Source URL: opensrs.com

      Language: English - Date: 2015-05-21 13:12:11
      10Enterprise Architect  Sparx Systems Keystore Service Series: Visual Quick Start Guide

      Enterprise Architect Sparx Systems Keystore Service Series: Visual Quick Start Guide

      Add to Reading List

      Source URL: sparxsystems.com.au

      Language: English - Date: 2013-07-22 11:32:03