© 2023, IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. This is the accepted manuscript version of a conference paper which has been published in final form at https://doi.org/10.1109/COINS57856.2023.10189238Image encryption is a reliable method for securely transmitting images over a network. The time required to encrypt and decrypt an image in online applications is also very important. Although cellular automata cr...
Medical image segmentation is widely used to identify and isolate specific areas of study within the...
Abstract: This paper presents CRIPTOCEL, a complex project that aims the development and design of c...
Click on the DOI link to access the article (may not be free).In the field of cryptography, public k...
Reversible cellular automation is a highly parallel system and produces enhanced throughput in its c...
Cellular Automata(CA) is a discrete computing model which provides simple, flexible and efficient pl...
Abstract:- This paper presents a complex project that aims the development and design of a parallel ...
Previous researches have shown that image encryption could be done using techniques like DES, IDEA, ...
AbstractWe propose a novel images encryption schema based on reversible one-dimensional cellular aut...
This article presents an encryption system based on the PCA (Programmable Cellular Automata) theory ...
Massively parallel computers have become undisputed champions in the supercomputing arena. The glob...
Cellular automata (CA) are simple models of computation which exhibit fascinatingly complex behavior...
RSA is a public key cryptography widely used for end-to-end authentication and key exchange in vario...
Abstract—As design of cellular automata rules using conventional methods is a difficult task, evolut...
The purpose of image encryption is to protect content from unauthorized access. Image encryption is ...
Cellular automata, represented by a discrete set of elements are ideal candidates for parallelisati...
Medical image segmentation is widely used to identify and isolate specific areas of study within the...
Abstract: This paper presents CRIPTOCEL, a complex project that aims the development and design of c...
Click on the DOI link to access the article (may not be free).In the field of cryptography, public k...
Reversible cellular automation is a highly parallel system and produces enhanced throughput in its c...
Cellular Automata(CA) is a discrete computing model which provides simple, flexible and efficient pl...
Abstract:- This paper presents a complex project that aims the development and design of a parallel ...
Previous researches have shown that image encryption could be done using techniques like DES, IDEA, ...
AbstractWe propose a novel images encryption schema based on reversible one-dimensional cellular aut...
This article presents an encryption system based on the PCA (Programmable Cellular Automata) theory ...
Massively parallel computers have become undisputed champions in the supercomputing arena. The glob...
Cellular automata (CA) are simple models of computation which exhibit fascinatingly complex behavior...
RSA is a public key cryptography widely used for end-to-end authentication and key exchange in vario...
Abstract—As design of cellular automata rules using conventional methods is a difficult task, evolut...
The purpose of image encryption is to protect content from unauthorized access. Image encryption is ...
Cellular automata, represented by a discrete set of elements are ideal candidates for parallelisati...
Medical image segmentation is widely used to identify and isolate specific areas of study within the...
Abstract: This paper presents CRIPTOCEL, a complex project that aims the development and design of c...
Click on the DOI link to access the article (may not be free).In the field of cryptography, public k...