Eslami, Ziba; Noroozi, Mahnaz; Amirizirtol, Kobra Public key encryption with distributed keyword search. (English) Zbl 1504.94138 J. Discrete Math. Sci. Cryptography 25, No. 8, 2369-2393 (2022). MSC: 94A60 68P25 94A62 68P20 68P10 PDFBibTeX XMLCite \textit{Z. Eslami} et al., J. Discrete Math. Sci. Cryptography 25, No. 8, 2369--2393 (2022; Zbl 1504.94138) Full Text: DOI
Himthani, Varsha; Dhaka, Vijaypal Singh; Kaur, Manjit; Hemrajani, Prashant V-net architecture based advanced visually meaningful image encryption technique. (English) Zbl 07637255 J. Discrete Math. Sci. Cryptography 25, No. 7, 2183-2194 (2022). MSC: 68P25 PDFBibTeX XMLCite \textit{V. Himthani} et al., J. Discrete Math. Sci. Cryptography 25, No. 7, 2183--2194 (2022; Zbl 07637255) Full Text: DOI
Chaudhary, Shikha; Hiranwal, Saroj; Gupta, C. P. Graph signal processing and tunicate swarm optimization based image steganography using hybrid chaotic map based image scrambling. (English) Zbl 07637253 J. Discrete Math. Sci. Cryptography 25, No. 7, 2159-2171 (2022). MSC: 68M25 94A08 94A60 34C28 PDFBibTeX XMLCite \textit{S. Chaudhary} et al., J. Discrete Math. Sci. Cryptography 25, No. 7, 2159--2171 (2022; Zbl 07637253) Full Text: DOI
De, Soumi; Prabu, P. Predicting customer churn: a systematic literature review. (English) Zbl 07637236 J. Discrete Math. Sci. Cryptography 25, No. 7, 1965-1985 (2022). MSC: 68T35 PDFBibTeX XMLCite \textit{S. De} and \textit{P. Prabu}, J. Discrete Math. Sci. Cryptography 25, No. 7, 1965--1985 (2022; Zbl 07637236) Full Text: DOI
Addis, Gezahagne Mulat; Kausar, Nasreen; Munir, Mohammad Fuzzy homomorphism theorems on rings. (English) Zbl 1496.16047 J. Discrete Math. Sci. Cryptography 25, No. 6, 1757-1776 (2022). MSC: 16Y80 16D25 PDFBibTeX XMLCite \textit{G. M. Addis} et al., J. Discrete Math. Sci. Cryptography 25, No. 6, 1757--1776 (2022; Zbl 1496.16047) Full Text: DOI
Çitak, Filiz Characterization of bipolar soft ideal in near rings. (English) Zbl 1496.16046 J. Discrete Math. Sci. Cryptography 25, No. 6, 1717-1728 (2022). MSC: 16Y30 16Y80 PDFBibTeX XMLCite \textit{F. Çitak}, J. Discrete Math. Sci. Cryptography 25, No. 6, 1717--1728 (2022; Zbl 1496.16046) Full Text: DOI
Gaketem, T.; Siripitukdet, M. Some semigroups characterized in terms of generalized interval valued fuzzy ideals. (English) Zbl 1496.20132 J. Discrete Math. Sci. Cryptography 25, No. 6, 1667-1681 (2022). MSC: 20N25 20M12 PDFBibTeX XMLCite \textit{T. Gaketem} and \textit{M. Siripitukdet}, J. Discrete Math. Sci. Cryptography 25, No. 6, 1667--1681 (2022; Zbl 1496.20132) Full Text: DOI
Gaketem, T. Cubic interior ideal in semigroup. (English) Zbl 1505.20063 J. Discrete Math. Sci. Cryptography 25, No. 6, 1569-1590 (2022). MSC: 20N25 20M12 PDFBibTeX XMLCite \textit{T. Gaketem}, J. Discrete Math. Sci. Cryptography 25, No. 6, 1569--1590 (2022; Zbl 1505.20063) Full Text: DOI
Jittburus, Uraiwan; Julatha, Pongpun; Iampan, Aiyared INF-hesitant fuzzy ideals of semigroups and their INF-hesitant fuzzy translations. (English) Zbl 1496.20134 J. Discrete Math. Sci. Cryptography 25, No. 5, 1487-1507 (2022). MSC: 20N25 20M12 PDFBibTeX XMLCite \textit{U. Jittburus} et al., J. Discrete Math. Sci. Cryptography 25, No. 5, 1487--1507 (2022; Zbl 1496.20134) Full Text: DOI
Gaketem, Thiti On interval valued fuzzy almost \((m, n)\)-ideal in semigroups. (English) Zbl 1491.20178 J. Discrete Math. Sci. Cryptography 25, No. 1, 171-180 (2022). MSC: 20N25 20M12 PDFBibTeX XMLCite \textit{T. Gaketem}, J. Discrete Math. Sci. Cryptography 25, No. 1, 171--180 (2022; Zbl 1491.20178) Full Text: DOI
AL-Hur Kadum, Intissar Abd; Abdulwahab, Azal Taha; Alkfari, Batool Hatem Akar A fuzzy function of C-level subsets. (English) Zbl 1491.03039 J. Discrete Math. Sci. Cryptography 24, No. 6, 1657-1662 (2021). MSC: 03E72 PDFBibTeX XMLCite \textit{I. A. AL-Hur Kadum} et al., J. Discrete Math. Sci. Cryptography 24, No. 6, 1657--1662 (2021; Zbl 1491.03039) Full Text: DOI
Suebsan, Peerapong On relative fuzzy soft sets over some semigroups in decision-making problems. (English) Zbl 1483.91067 J. Discrete Math. Sci. Cryptography 24, No. 1, 209-222 (2021). MSC: 91B06 03E72 PDFBibTeX XMLCite \textit{P. Suebsan}, J. Discrete Math. Sci. Cryptography 24, No. 1, 209--222 (2021; Zbl 1483.91067) Full Text: DOI
Selvarathi, M. Algebraic properties of implication-based intuitionistic fuzzy finite state machine over a finite group. (English) Zbl 07477494 J. Discrete Math. Sci. Cryptography 24, No. 1, 195-207 (2021). MSC: 68Q70 08A72 20N25 PDFBibTeX XMLCite \textit{M. Selvarathi}, J. Discrete Math. Sci. Cryptography 24, No. 1, 195--207 (2021; Zbl 07477494) Full Text: DOI
Charif, Khalid; Guennoun, Zine El Abidine A novel image encryption algorithm based on chaotic billiards. (English) Zbl 1483.94038 J. Discrete Math. Sci. Cryptography 24, No. 1, 129-154 (2021). MSC: 94A60 94A08 81P94 37D99 PDFBibTeX XMLCite \textit{K. Charif} and \textit{Z. E. A. Guennoun}, J. Discrete Math. Sci. Cryptography 24, No. 1, 129--154 (2021; Zbl 1483.94038) Full Text: DOI
Singh, Bharat; Urooj, Shabana; Singh, Sudhakar Analysis of autopilot system, integrated with modelling and comparison of different controllers with the system. (English) Zbl 1485.93397 J. Discrete Math. Sci. Cryptography 23, No. 5, 1059-1068 (2020). MSC: 93C85 93B52 93C42 93B35 PDFBibTeX XMLCite \textit{B. Singh} et al., J. Discrete Math. Sci. Cryptography 23, No. 5, 1059--1068 (2020; Zbl 1485.93397) Full Text: DOI
Hanoon, Wafaa H.; Aljassa, Safaa M.; Fiadh, Mahmood S. Nearly 2-absorbing and weakly nearly 2-absorbing fuzzy submodules. (English) Zbl 1480.13009 J. Discrete Math. Sci. Cryptography 23, No. 5, 1025-1037 (2020). MSC: 13C13 PDFBibTeX XMLCite \textit{W. H. Hanoon} et al., J. Discrete Math. Sci. Cryptography 23, No. 5, 1025--1037 (2020; Zbl 1480.13009) Full Text: DOI
Dehghan, O. R. Sum and scalar product of fuzzy subhyperspaces. (English) Zbl 1486.15001 J. Discrete Math. Sci. Cryptography 23, No. 4, 841-860 (2020). MSC: 15A03 PDFBibTeX XMLCite \textit{O. R. Dehghan}, J. Discrete Math. Sci. Cryptography 23, No. 4, 841--860 (2020; Zbl 1486.15001) Full Text: DOI
Manaa, Mehdi Ebady; Hadi, Zuhair Gheni Scalable and robust cryptography approach using cloud computing. (English) Zbl 1508.68097 J. Discrete Math. Sci. Cryptography 23, No. 7, 1439-1445 (2020). MSC: 68P25 68M11 68U10 94A60 PDFBibTeX XMLCite \textit{M. E. Manaa} and \textit{Z. G. Hadi}, J. Discrete Math. Sci. Cryptography 23, No. 7, 1439--1445 (2020; Zbl 1508.68097) Full Text: DOI
Vimala, J.; Ilamathi, VS. Anusuya; Rajareega, S. Implicative and positive implicative filters of residuated lattices in multiset context. (English) Zbl 1495.06001 J. Discrete Math. Sci. Cryptography 22, No. 5, 869-882 (2019). MSC: 06B05 06D72 03G10 06D20 PDFBibTeX XMLCite \textit{J. Vimala} et al., J. Discrete Math. Sci. Cryptography 22, No. 5, 869--882 (2019; Zbl 1495.06001) Full Text: DOI
Norouzi, Morteza Normal subfuzzy \((m, n)\)-hypermodules. (English) Zbl 1495.16046 J. Discrete Math. Sci. Cryptography 22, No. 3, 433-451 (2019). MSC: 16Y80 16D99 PDFBibTeX XMLCite \textit{M. Norouzi}, J. Discrete Math. Sci. Cryptography 22, No. 3, 433--451 (2019; Zbl 1495.16046) Full Text: DOI
Talee, Aakif Fairooze; Abbasi, Mohammad Yahya; Khan, Sabahat Ali; Hila, Kostaq Fuzzy set approach to hyperideal theory of po-ternary semihypergroups. (English) Zbl 1495.06017 J. Discrete Math. Sci. Cryptography 22, No. 3, 411-431 (2019). MSC: 06F99 20N25 20N20 20N10 PDFBibTeX XMLCite \textit{A. F. Talee} et al., J. Discrete Math. Sci. Cryptography 22, No. 3, 411--431 (2019; Zbl 1495.06017) Full Text: DOI
Yang, Hong; Zhang, Xiujun The independent domination numbers of strong product of two cycles. (English) Zbl 1481.05120 J. Discrete Math. Sci. Cryptography 21, No. 7-8, 1495-1507 (2018). MSC: 05C69 05C76 PDFBibTeX XMLCite \textit{H. Yang} and \textit{X. Zhang}, J. Discrete Math. Sci. Cryptography 21, No. 7--8, 1495--1507 (2018; Zbl 1481.05120) Full Text: DOI
Chiaselotti, Giampiero; Gentile, Tommaso; Infusino, Federico; Oliverio, Paolo A. Indiscernibility structures induced from function sets: graph and digraph case. (English) Zbl 1481.06030 J. Discrete Math. Sci. Cryptography 21, No. 5, 1069-1096 (2018). MSC: 06D72 06A06 05C20 05C65 PDFBibTeX XMLCite \textit{G. Chiaselotti} et al., J. Discrete Math. Sci. Cryptography 21, No. 5, 1069--1096 (2018; Zbl 1481.06030) Full Text: DOI
Ma, Xue-Ling; Zhan, Jianming; Khan, Madad; Gulistan, Muhammad; Yaqoob, Naveed Generalized cubic relations in \(\mathrm{H}_v\)-LA-semigroups. (English) Zbl 1481.20219 J. Discrete Math. Sci. Cryptography 21, No. 3, 607-630 (2018). MSC: 20N02 20N20 PDFBibTeX XMLCite \textit{X.-L. Ma} et al., J. Discrete Math. Sci. Cryptography 21, No. 3, 607--630 (2018; Zbl 1481.20219) Full Text: DOI
Chande, Manoj Kumar; Lee, Cheng-Chi; Li, Chun-Ta Cryptanalysis and improvement of a ECDLP based proxy blind signature scheme. (English) Zbl 1481.94089 J. Discrete Math. Sci. Cryptography 21, No. 1, 23-34 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{M. K. Chande} et al., J. Discrete Math. Sci. Cryptography 21, No. 1, 23--34 (2018; Zbl 1481.94089) Full Text: DOI
Akram, Muhammad; Adeel, Arooj \(m\)-polar fuzzy graphs and \(m\)-polar fuzzy line graphs. (English) Zbl 1495.05273 J. Discrete Math. Sci. Cryptography 20, No. 8, 1597-1617 (2017). MSC: 05C72 05C76 PDFBibTeX XMLCite \textit{M. Akram} and \textit{A. Adeel}, J. Discrete Math. Sci. Cryptography 20, No. 8, 1597--1617 (2017; Zbl 1495.05273) Full Text: DOI
Ahadpour, Sodeif; Sadra, Yaser Chaotic trigonometric Haar wavelet with focus on image encryption. (English) Zbl 1500.42017 J. Discrete Math. Sci. Cryptography 20, No. 5, 1217-1239 (2017). Reviewer: Françoise Bastin (Liège) MSC: 42C40 65T60 68P25 94A08 94A60 PDFBibTeX XMLCite \textit{S. Ahadpour} and \textit{Y. Sadra}, J. Discrete Math. Sci. Cryptography 20, No. 5, 1217--1239 (2017; Zbl 1500.42017) Full Text: DOI arXiv
Hsiao, Shih-Wen; Hsiao, Yu-Ting A study of integrating the grey relational multi-attribute decision making analysis into the selection of product seriation scheme. (English) Zbl 1512.91046 J. Discrete Math. Sci. Cryptography 19, No. 4, 911-934 (2016). MSC: 91B06 90B50 PDFBibTeX XMLCite \textit{S.-W. Hsiao} and \textit{Y.-T. Hsiao}, J. Discrete Math. Sci. Cryptography 19, No. 4, 911--934 (2016; Zbl 1512.91046) Full Text: DOI
Kong, Feng; Wei, Wei; Gong, Jia-Hao Rank reversal and rank preservation in ANP method. (English) Zbl 1511.90249 J. Discrete Math. Sci. Cryptography 19, No. 3, 821-836 (2016). MSC: 90B50 90C08 PDFBibTeX XMLCite \textit{F. Kong} et al., J. Discrete Math. Sci. Cryptography 19, No. 3, 821--836 (2016; Zbl 1511.90249) Full Text: DOI
Xing, Xiaochen; Cai, Yuanwen; Zhao, Zhengyu; Cheng, Long Weighted evidence combination based on improved conflict factor. (English) Zbl 1496.68342 J. Discrete Math. Sci. Cryptography 19, No. 1, 173-184 (2016). MSC: 68T37 68T30 PDFBibTeX XMLCite \textit{X. Xing} et al., J. Discrete Math. Sci. Cryptography 19, No. 1, 173--184 (2016; Zbl 1496.68342) Full Text: DOI
Sarde, Pankaj; Banerjee, Amitabh Strong designated verifier signature scheme based on discrete logarithm problem. (English) Zbl 1495.94090 J. Discrete Math. Sci. Cryptography 18, No. 6, 877-885 (2015). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{P. Sarde} and \textit{A. Banerjee}, J. Discrete Math. Sci. Cryptography 18, No. 6, 877--885 (2015; Zbl 1495.94090) Full Text: DOI
Ezhilmaran, D.; Sankar, K. Morphism of bipolar intuitionistic fuzzy graphs. (English) Zbl 1490.05226 J. Discrete Math. Sci. Cryptography 18, No. 5, 605-621 (2015). MSC: 05C72 05C60 PDFBibTeX XMLCite \textit{D. Ezhilmaran} and \textit{K. Sankar}, J. Discrete Math. Sci. Cryptography 18, No. 5, 605--621 (2015; Zbl 1490.05226) Full Text: DOI
Tung, Cheng-Tan; Hopscotch, Chu Discussion on similarity measure of its complement. (English) Zbl 1495.03072 J. Discrete Math. Sci. Cryptography 18, No. 4, 417-432 (2015). MSC: 03E72 PDFBibTeX XMLCite \textit{C.-T. Tung} and \textit{C. Hopscotch}, J. Discrete Math. Sci. Cryptography 18, No. 4, 417--432 (2015; Zbl 1495.03072) Full Text: DOI
Chuang, Pi-Chang; Chao, Chung-Jen; Hung, Kuo-Chen Discussion on definitions for similarity measures of intuitionistic fuzzy sets. (English) Zbl 1393.68158 J. Discrete Math. Sci. Cryptography 17, No. 2, 149-156 (2014). MSC: 68T10 PDFBibTeX XMLCite \textit{P.-C. Chuang} et al., J. Discrete Math. Sci. Cryptography 17, No. 2, 149--156 (2014; Zbl 1393.68158) Full Text: DOI
Deng, Lun-Zhi; Li, Siwei; Wang, Xiangbin Attribute based signcryption with constant ciphertext length. (English) Zbl 1348.94041 J. Discrete Math. Sci. Cryptography 16, No. 6, 337-347 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{L.-Z. Deng} et al., J. Discrete Math. Sci. Cryptography 16, No. 6, 337--347 (2013; Zbl 1348.94041) Full Text: DOI
Hwang, S. J.; Chao, C. H. An efficient non-interactive deniable authentication protocol with anonymous sender protection. (English) Zbl 1215.94077 J. Discrete Math. Sci. Cryptography 13, No. 3, 219-231 (2010). MSC: 94A62 PDFBibTeX XMLCite \textit{S. J. Hwang} and \textit{C. H. Chao}, J. Discrete Math. Sci. Cryptography 13, No. 3, 219--231 (2010; Zbl 1215.94077) Full Text: DOI Link
Hedayati, H. \(t\)-implication-based fuzzy interior hyperideals of semihypergroups. (English) Zbl 1227.20064 J. Discrete Math. Sci. Cryptography 13, No. 2, 123-140 (2010). Reviewer: Bijan Davvaz (Yazd) MSC: 20N20 20N25 PDFBibTeX XMLCite \textit{H. Hedayati}, J. Discrete Math. Sci. Cryptography 13, No. 2, 123--140 (2010; Zbl 1227.20064) Full Text: DOI Link
Hedayati, H.; Jafari, Z. Connections between interval valued fuzzy graphs and fuzzy groups with \((S,T)\)-norms. (English) Zbl 1203.05130 J. Discrete Math. Sci. Cryptography 12, No. 5, 521-531 (2009). MSC: 05C72 03E72 54A40 PDFBibTeX XMLCite \textit{H. Hedayati} and \textit{Z. Jafari}, J. Discrete Math. Sci. Cryptography 12, No. 5, 521--531 (2009; Zbl 1203.05130) Full Text: DOI
Wu, Chia-Chi; Chang, Chin-Chen Attacks on provably secure proxy-protected signature schemes based on factoring. (English) Zbl 1172.94601 J. Discrete Math. Sci. Cryptography 10, No. 2, 193-204 (2007). MSC: 94A60 PDFBibTeX XMLCite \textit{C.-C. Wu} and \textit{C.-C. Chang}, J. Discrete Math. Sci. Cryptography 10, No. 2, 193--204 (2007; Zbl 1172.94601) Full Text: DOI
Ikpotokin, F. O.; Chiemeke, S. C. Mathematical derivation of the multi-peg Tower of Hanoi algorithm. (English) Zbl 1152.68448 J. Discrete Math. Sci. Cryptography 10, No. 5, 621-636 (2007). MSC: 68Q25 68W40 PDFBibTeX XMLCite \textit{F. O. Ikpotokin} and \textit{S. C. Chiemeke}, J. Discrete Math. Sci. Cryptography 10, No. 5, 621--636 (2007; Zbl 1152.68448) Full Text: DOI
Suganya, A.; Vijayarangan, N. Landau-Ramanujan keyed hash functions for message authentication. (English) Zbl 1093.94027 J. Discrete Math. Sci. Cryptography 9, No. 1, 1-8 (2006). MSC: 94A62 PDFBibTeX XMLCite \textit{A. Suganya} and \textit{N. Vijayarangan}, J. Discrete Math. Sci. Cryptography 9, No. 1, 1--8 (2006; Zbl 1093.94027) Full Text: DOI
Iembo, Rosanna; Squillante, Massimo; Ventre, Aldo Common fixed points for families of commutative transformations. (English) Zbl 1093.47052 J. Discrete Math. Sci. Cryptography 8, No. 2, 175-188 (2005). Reviewer: Salvatore Sessa (Napoli) MSC: 47H10 47H07 54H25 PDFBibTeX XMLCite \textit{R. Iembo} et al., J. Discrete Math. Sci. Cryptography 8, No. 2, 175--188 (2005; Zbl 1093.47052) Full Text: DOI
Chu, Tachung; Huang, Kuoshi; Chang, Tzuming COA defuzzification method for evaluating \(C_{pk}\) under fuzzy environments. (English) Zbl 1067.94600 J. Discrete Math. Sci. Cryptography 7, No. 3, 271-280 (2004). MSC: 94D05 94A15 PDFBibTeX XMLCite \textit{T. Chu} et al., J. Discrete Math. Sci. Cryptography 7, No. 3, 271--280 (2004; Zbl 1067.94600) Full Text: DOI
Tseng, Yuh-Min A cryptographic key assignment scheme for access control in a hierarchy with exceptions. (English) Zbl 1056.94009 J. Discrete Math. Sci. Cryptography 7, No. 1, 121-132 (2004). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{Y.-M. Tseng}, J. Discrete Math. Sci. Cryptography 7, No. 1, 121--132 (2004; Zbl 1056.94009) Full Text: DOI
Lin, Chu-Hsing; Yeh, Yi-Shiung; Lee, Chen-Yu Keyed/unkeyed SHA-2. (English) Zbl 1064.94548 J. Discrete Math. Sci. Cryptography 6, No. 1, 45-58 (2003). MSC: 94A60 PDFBibTeX XMLCite \textit{C.-H. Lin} et al., J. Discrete Math. Sci. Cryptography 6, No. 1, 45--58 (2003; Zbl 1064.94548) Full Text: DOI
Chiu, Kuang-Hui Two phases encryption and its applications. (English) Zbl 1022.68058 J. Discrete Math. Sci. Cryptography 5, No. 3, 303-328 (2002). MSC: 68P25 94A60 94A62 PDFBibTeX XMLCite \textit{K.-H. Chiu}, J. Discrete Math. Sci. Cryptography 5, No. 3, 303--328 (2002; Zbl 1022.68058) Full Text: DOI
Zahedi, M. M.; Kouchi, H. Moradi (Anti-) fuzzy (normal) sub-\(F\)-polygroups and fuzzy \(\alpha\)-cosets. (English) Zbl 1011.20069 J. Discrete Math. Sci. Cryptography 5, No. 1, 85-104 (2002). MSC: 20N25 20N20 PDFBibTeX XMLCite \textit{M. M. Zahedi} and \textit{H. M. Kouchi}, J. Discrete Math. Sci. Cryptography 5, No. 1, 85--104 (2002; Zbl 1011.20069) Full Text: DOI
Chu, Ta-Chung Ranking fuzzy numbers by a ratio of relative areas. (English) Zbl 1038.91026 J. Discrete Math. Sci. Cryptography 5, No. 1, 23-34 (2002). MSC: 91B06 03E72 PDFBibTeX XMLCite \textit{T.-C. Chu}, J. Discrete Math. Sci. Cryptography 5, No. 1, 23--34 (2002; Zbl 1038.91026) Full Text: DOI