Research Article

Citations for "Suitability of Using Symmetric Key to Secure Multimedia Data: An Overview"


Citation to this article as recorded by ASCI logo


Al-Alak, S., Z. Zukarnain, A. Abdullah and S. Subramiam, 2013. Randomness improvement of AES using MKP. Res. J. Inf. Technol., 5: 24-34.
CrossRef  |  Direct Link  |  

Alanizi, H.O., M.L.M. Kiah, A.A. Zaidan, B.B. Zaidan and G.M. Alam, 2010. Secure topology for electronic medical record transmissions. Int. J. Pharmacol., 6: 954-958.
CrossRef  |  Direct Link  |  

Jaberi, A., R. Ayanzadeh and A.S.Z. Mousavi, 2012. Two-layer cellular automata based cryptography. Trends Applied Sci. Res., 7: 68-77.
CrossRef  |  Direct Link  |  

Janakiraman, S., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Compiler optimization and plain text pre-processing to hoist the height of HIGHT in AVR platform. Res. J. Inform. Technol., 6: 356-367.
CrossRef  |  Direct Link  |  

Janakiraman, S., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2015. Light weight steganography on RISC platform-implementation and analysis. Asian J. Scient. Res., 8: 278-290.
CrossRef  |  Direct Link  |  

Janakiraman, S., K.V.S.K. Kumar, R.R.K. Reddy, A. Srinivasulu, R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2014. Humming bird with coloured wings: A feedback security approach. Inform. Technol. J., 13: 2022-2026.
CrossRef  |  Direct Link  |  

Janakiraman, S., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2012. Firmware for data security: A review. Res. J. Inform. Technol., 4: 61-72.
CrossRef  |  Direct Link  |  

Nabi, M.S.A., M.L.M. Kiah, B.B. Zaidan, A.A. Zaidan and G.M. Alam, 2010. Suitability of using SOAP protocol to secure electronic medical record databases transmission. Int. J. Pharmacol., 6: 959-964.
CrossRef  |  Direct Link  |  

Salem, Y., M. Abomhara, O.O. Khalifa, A.A. Zaidan and B.B. Zaidan, 2011. A review on multimedia communications cryptography. Res. J. Inform. Technol., 3: 146-152.
CrossRef  |  Direct Link  |  

Watari, M.A., A.A. Zaidan and B.B. Zaidan, 2013. Securing m-government transmission based on symmetric and asymmetric algorithms: A review. Asian J. Sci. Res., 6: 632-649.
CrossRef  |  Direct Link  |  

Zaidan, A.A., B.B. Zaidan, A.K. Al-Frajat and H.A. Jalab, 2010. An overview: Theoretical and mathematical perspectives for advance encryption standard/rijndael. J. Applied Sci., 10: 2161-2167.
CrossRef  |  Direct Link  |  

Zaidan, B.B., A.A. Zaidan and M.L.M. Kiah, 2011. Impact of data privacy and confidentiality on developing telemedicine applications: A review participates opinion and expert concerns. Int. J. Pharmacol., 7: 382-387.
CrossRef  |  Direct Link  |  


Citations in impact factor journal as recorded by Crossref logo


Real-Time Medical Systems Based on Human Biometric Steganography: a Systematic Review
Journal of Medical Systems Vol. 42, Issue 12, , 2018

Real-Time Remote Health Monitoring Systems Using Body Sensor Information and Finger Vein Biometric Verification: A Multi-Layer Systematic Review
Journal of Medical Systems Vol. 42, Issue 12, , 2018

Sensor-Based mHealth Authentication for Real-Time Remote Healthcare Monitoring System: A Multilayer Systematic Review
Journal of Medical Systems Vol. 43, Issue 2, , 2019

Smart Home-based IoT for Real-time and Secure Remote Health Monitoring of Triage and Priority System using Body Sensors: Multi-driven Systematic Review
Journal of Medical Systems Vol. 43, Issue 3, , 2019

Based Medical Systems for Patient’s Authentication: Towards a New Verification Secure Framework Using CIA Standard
Journal of Medical Systems Vol. 43, Issue 7, , 2019

SecP2PVoD: a secure peer-to-peer video-on-demand system against pollution attack and untrusted service provider
Multimedia Tools and Applications

Secure Topology for Electronic Medical Record Transmissions
International Journal of Pharmacology Vol. 6, Issue 6, 954, 2010

Impact of Data Privacy and Confidentiality on Developing Telemedicine Applications: A Review Participates Opinion and Expert Concerns
International Journal of Pharmacology Vol. 7, Issue 3, 382, 2011


Citation to this article as recorded by Crossref logo


Based blockchain-PSO-AES techniques in finger vein biometrics: A novel verification secure framework for patient authentication
Computer Standards & Interfaces

New Method of Image Steganography Based on Particle Swarm Optimization Algorithm in Spatial Domain for High Embedding Capacity
IEEE Access

Finger Vein Biometrics: Taxonomy Analysis, Open Challenges, Future Directions, and Recommended Solution for Decentralised Network Architectures
IEEE Access

An Overview: Theoretical and Mathematical Perspectives for Advance Encryption Standard/Rijndael
Journal of Applied Sciences Vol. 10, Issue 18, 2161, 2010

A Review on Multimedia Communications Cryptography
Research Journal of Information Technology Vol. 3, Issue 3, 146, 2011

Two-layer Cellular Automata Based Cryptography
Trends in Applied Sciences Research Vol. 7, Issue 1, 68, 2012

Services
Related Articles in ASCI
Search in Google Scholar
View Citation
Report Citation

 
©  2022 Science Alert. All Rights Reserved