Journal of Discrete Mathematical Sciences and Cryptography

Title Publication Date Language Citations
Normal subfuzzy (m,n)-hypermodules2019/04/03English9
The innovation of college physical training based on computer virtual reality technology2018/08/18English9
Power saving by incorporating mobile agents and clustering approach in wireless sensor networks2012/04/01English8
Strong identities and fortification in transposition hypergroups2003/01/01English8
The corruption prevention model2000/04/01English8
A class of hyperrings2003/01/01English8
On the bounded partition dimension of some classes of convex polytopes2021/07/01English8
On the genus spectrum of maximal curves over finite fields2015/09/03English8
On the roots of Hosoya polynomial2016/01/02English8
Rank reversal and Rank Preservation in ANP method2016/05/03English8
Performance observation of mammograms using an improved dynamic window based adaptive median filter2020/01/02English8
Personality analysis through handwriting recognition2020/01/02English8
Analyzing the boron triangular nanotube through topological indices via M-polynomial2021/02/17English8
Reciprocal Vieta-type formulas and some applications2018/01/02English8
PSO-DEC: PSO based deterministic energy efficient clustering protocol for IoT2019/11/17English8
A novel accelerated implementation of RSA using parallel processing2019/02/17English8
The minimum Hamming distances of the irreducible cyclic codes of length2016/11/01English8
Robust progressive block based visual cryptography with chaotic map2016/11/01English8
Handwritten character recognition technology combined with artificial intelligence2016/12/27English8
Effects of fluctuations in international oil prices on China’s price level based on VAR model2016/12/27English8
On DG-topological spaces associated with directed graphs2020/06/04English8
An efficient self-certified multi-proxy signature scheme based on elliptic curve discrete logarithm problem2020/05/07English8
Security issues in wireless sensor network – A survey2021/07/04English8
Information cryptography using cellular automata and digital image processing2022/05/19English8
Pseudonym generation using genetic algorithm in vehicular ad hoc networks2019/05/19English8
L-RTAM: Logarithm based reliable trust assessment model for WBSNs2021/04/15English8
Constructing ID-based cryptographic technique for IFP and GDLP based cryptosystem2017/07/04English8
Geodetic Domination in the Corona and Join of Graphs2014/01/02English7
Fuzzy homomorphism theorems on rings2020/11/17English7
A new enhancement of elliptic curve digital signature algorithm2019/07/05English7