Based - Videos
Find videos related to your search query. Browse through our collection of videos matching "based". Search across titles, descriptions, tags, and channels to discover the content you're looking for.
Search Results for "based"
50 results found
15:34
GUI BASED IMAGE STEGANOGRAPHY IN DWT DOMAIN USING DOUBLE STEGGING WITH RSA ENCRYPTION
VERILOG COURSE TEAM
2.2K views
4:23
Lattice-Based Cryptography: Mathematical Foundations for Post-Quantum Security
g Fun Facts online
22 views
12:07
A Hybrid Encryption Technique based on DNA Cryptography and Steganography | IEMCON 2022
A.I. Enthusiast
130 views
1:08:45
Alikram NuhbalaoÄlu | Edward Farhi | Physics Based Quantum Algorithms
Alikram Nuhbalaoglu
23 views
19:28
Permutation-based Cryptography - talk 1/3 (FSE 2025)
IACR
39 views
1:03:44
Post-quantum cryptography from supersingular isogeny problems?
Microsoft Research
2.7K views
4:18
Raspberrypi based steganography
Embedded Systems,VLSI,Matlab, PLC scada Training Institute in Hyderabad-nanocdac.com
336 views
54:02
s-182 Obfuscation, Functional Encryption, and Attribute-Based Encryption
IACR
641 views
2:31
9 April Bangladeshi Web Series Based On Real Life Story |āĻŽā§āύā§āϰ āĻā§āĻā§āϰ āϏā§āĻ āϏāϤā§āϝāĻŋ āĻāĻāύāĻž āĻāĻŦāĻžāϰ āĻā§ā§āĻŦ āϏāĻŋāϰāĻŋāĻā§
The Confused Man (Saiful Asif Present)
21.4K views
7:28
Cyber Science 2015: Chaos based Image Encryption using an AONT part1
C-MRiC ORG
1.1K views
20:45
Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model.
IACR
1.2K views
1:24:03
Based On A True Story | Dark Past 2025 | Drama Thriller Movies 2025
Cowboy Music09
25.3K views
2:50
Prj. An Edge Based Image Steganography with Compression and Encryption by Alex21C
Abhishek kumar
160 views
1:37:53
Tanja Lange - Code-Based Cryptography
PQCrypto 2016
3.6K views
2:20
What Is Lattice-Based Cryptography? - CryptoBasics360.com
CryptoBasics360
171 views
8:19
Low power Memristor Based 7T SRAM Using MTCMOS Technique
MyProjectBazaar
129 views
0:29
Employment-Based Adjustments: What to Know #Immigration #ImmigrationLaw
Zaira Solano
1.3K views
8:48
TEDxTucson - Kim Ogden- Sustainable Algae-Based Biofuels
TEDx Talks
10.7K views
2:16
SOURCE CODE GIAU TIN TRONG ANH DPIS
Phong TháēĄch Tháģ
47 views
0:17
When the Turn-Based Combat is Actually Terrifying
CircleToonsHD
14.8M views
6:34
Hardware-based Encryption - CompTIA Security+ SY0-401: 4.4
Professor Messer
21.5K views
3:13
DCT Based Image Steganography & Compression Matlab Project With Source Code
Roshan Helonde
917 views
8:51
A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the Use of the PNG
JP INFOTECH PROJECTS
1.6K views
1:32:35
Grandmaâs House | Faith-Based Family Movie 4K | Heartfelt Movies
Heartfelt Movies - Full Movies Online
576.4K views
1:22:01
"Code-Based Post-Quantum Cryptography" by Prof. Jean-Christophe Deneuville (Part. 1/3)
CIMPA Math
417 views
38:32
Advantages of FPGA-based cryptography
Xiphera Ltd.
787 views
2:36
A Secured key based secret data sharing system in Steganography
Students Project
142 views
1:11
Fish Sperm Skin Boosters?! #shorts #doctor #skinbooster #skincare #skin #healthyskin #injection
SL Aesthetic Clinic
278 views
3:04
Cryptography with Matrices
Jelou Porto
459 views
2:00
Score-Based Diffusion Models as Bayesian Priors for Computational Imaging (ICCP 2023)
Berthy Feng
482 views
4:35
Python Basics Tutorial Cryptography Password Based Key Derivation Function || Data Encryption
Python Basics
1.2K views
11:21
Lecture 3, Video 3: The McEliece Cryptosystem
Mary Wootters
10.4K views
5:05
Attribute-Based Hybrid Boolean Keyword Search over Outsourced Encrypted Data | IEEE Projects 2022
Cloud Technologies
66 views
10:49
Sales & Marketing Strategy For Service Based Business
Adam Erhart
364.4K views
1:46:01
ALYAS WAWAY | Full Movie | Action Drama w/ Cesar Montano, Cristina Gonzales, & Jun Aristorenas
SOLAR WATCH NOW
13.2M views
19:54
Until Dawn | The Best Choice Based Game Of All Time
Conz
4.0K views
8:51
Entanglement-Based Protocols - Sarah Croke - QCSYS 2011
Institute for Quantum Computing
1.0K views
15:46
Error Amplification in Code-based Cryptography
IACR
150 views
2:35
Distance Based Encryption How to Embed Fuzziness in Biometric Based Encryption
MileStone Research and InfoTech
26 views
52:07
MP Police Constable 2025 Exam Analysis | GK GS Memory Based Question Special Class | By Kundan Sir
The WiNNERS Institute
49.0K views
46:10
Talks - William Woodruff: Building a Rusty path validation library for PyCA Cryptography
PyCon US
109 views
5:19
Hardware based encryption: Cryptography |AES256| Information Security
USTA Cyber
549 views
34:59
TOC Example 2 - Scenario based question Turing Machine Construction
DEEBA KANNAN
7.4K views
1:46
DCT Based Steganography
Pantech.ai(Warriors Way Hub)
3.5K views
9:12
TOC Example 1 - Scenario based question Turing Machine Construction
DEEBA KANNAN
11.9K views
27:51
Webinar | The PUF based Hardware Root of Trust for Secure Supply Chain
eMemory Technology Inc.
374 views
44:52
Position-based Cryptography [1/2]
Microsoft Research
586 views
25:29
Product Recommendation an updated E-Shopping System | Cloud Technologies | IEEE Projects Hyderabad
Cloud Technologies
63 views
1:09
CULET: Cubelets Lego Universal Turing Machine ECA Rule 110
ALIROB IPN
1.8K views
6:42
Stegit - Image Based Steganography App
HARSH GUPTA
235 views