Javascript is disabled in your browser. Please
enable Javascript
to view PeerJ.
May 2022
Table of Contents - PeerJ Computer Science
Sorted by downloads
Publication date
Downloads
Pageviews
Comp Sci
PeerJ - Medicine articles
PeerJ - Biology & Life science articles
PeerJ - General bio (stats, legal, policy, edu)
PeerJ Computer Science
PeerJ Preprints
security-and-privacy
cryptography
Login to save + alerts
May 11, 2022
A novel systematic byte substitution method to design strong bijective substitution box (S-box) using piece-wise-linear chaotic map
Asim Ali
,
Muhammad Asif Khan
,
Ramesh Kumar Ayyasamy
,
Muhammad Wasif
https://doi.org/10.7717/peerj-cs.940
May 31, 2022
Privacy-preserving
k
-NN interpolation over two encrypted databases
Murat Osmanoglu
,
Salih Demir
,
Bulent Tugrul
https://doi.org/10.7717/peerj-cs.965
← Previous
1
Next →
Archives - Computer Science
security-and-privacy
cryptography
2024
September
2
August
5
July
1
June
1
May
0
April
1
March
4
February
0
January
4
2023
December
2
November
0
October
1
September
4
August
1
July
1
June
0
May
2
April
2
March
1
February
0
January
2
2022
December
1
November
2
October
1
September
1
August
0
July
0
June
0
May
2
April
1
March
0
February
0
January
1
2021
December
2
November
1
October
1
September
0
August
2
July
2
June
0
May
5
April
3
March
1
February
1
January
1
2020
February
1
Filter on subjects this month
cryptography
2
security-and-privacy
2
I told my colleagues that PeerJ is a journal where they need to publish if they want their paper to be published quickly and with the strict peer review expected from a good journal.
Sohath Vanegas,
PeerJ Author
View author feedback