Skip to main menu
Scroll to content
PL
|
EN
Full-text resources of PSJD and other databases are now available in the new Library of Science.
Visit
https://bibliotekanauki.pl
Search
Browse
About
test
Refine search results
Journals
7
International Journal of Electronics and Telecommunications
Years
1
2020
1
2018
1
2017
4
2016
Authors
7
Szczypiorski K.
2
Kordov K.
2
Stoyanov B.
1
Drzymała M.
1
Stanev S.
1
Todorova M.
1
Tyl T.
1
Urbański M. Ł.
Less...
More...
Preferences
Polski
English
Language
enabled
[disable]
Abstract
10
20
50
100
Number of results
Results found: 7
Number of results on page
10
20
50
100
Page
/ 1
Search results
Sort By:
accuracy
title
date descending
date ascending
journal title
author
Limit search:
in any field
in the title of publication
in the title of journal
among author
in the keywords
in references
Page
/ 1
1
Full text local access
StegHash: New Method for Information Hiding in Open Social Networks
100%
Szczypiorski K.
International Journal of Electronics and Telecommunications
|
2016
|
vol.
62
|
issue
4
2
Full text local access
Cyber(in)security
89%
Szczypiorski K.
,
Szczypiorski K.
International Journal of Electronics and Telecommunications
|
2020
|
vol.
66
|
issue
1
3
Full text local access
MoveSteg: A Method of Network Steganography Detection
63%
Szczypiorski K.
,
Tyl T.
International Journal of Electronics and Telecommunications
|
2016
|
vol.
62
|
issue
4
4
Full text local access
Steganography Training: a Case Study from University of Shumen in Bulgaria
63%
Szczypiorski K.
,
Stanev S.
International Journal of Electronics and Telecommunications
|
2016
|
vol.
62
|
issue
3
5
Full text local access
Yet Another Pseudorandom Number Generator
51%
Kordov K.
,
Stoyanov B.
,
Szczypiorski K.
International Journal of Electronics and Telecommunications
|
2017
|
vol.
63
|
issue
2
6
Full text local access
Network Steganography in the DNS Protocol
51%
Drzymała M.
,
Szczypiorski K.
,
Urbański M. Ł.
International Journal of Electronics and Telecommunications
|
2016
|
vol.
62
|
issue
4
7
Full text local access
SHAH: Hash Function Based on Irregularly Decimated Chaotic Map
51%
Todorova M.
,
Stoyanov B.
,
Szczypiorski K.
,
Kordov K.
International Journal of Electronics and Telecommunications
|
2018
|
vol.
64
|
issue
4
Page
/ 1
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.