![Open access](/images/ico/o.png)
![](/images/ico/ico5.png)
Author: Ometov Aleksandr Bezzateev Sergey Mäkitalo Niko Andreev Sergey Mikkonen Tommi Koucheryavy Yevgeni
Publisher: MDPI
E-ISSN: 2410-387x|2|1|1-1
ISSN: 2410-387x
Source: Cryptography, Vol.2, Iss.1, 2018-01, pp. : 1-1
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
![](/images/ico/o.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/o.png)
![](/images/ico/ico5.png)
![](/images/ico/o.png)
![](/images/ico/ico5.png)
An Effective Authentication Scheme Using DCT for Mobile Devices
By Chang Chin-Chen Lu Tzu-Chuen Zhu Zhao-Hua Tian Hui
Symmetry, Vol. 10, Iss. 1, 2018-01 ,pp. :
![](/images/ico/o.png)
![](/images/ico/ico5.png)
A Novel Perceptual Hash Algorithm for Multispectral Image Authentication
By Ding Kaimeng Chen Shiping Meng Fan
Algorithms, Vol. 11, Iss. 1, 2018-01 ,pp. :