Search

Showing total 200 results

Search Constraints

Start Over You searched for: Topic data encryption Remove constraint Topic: data encryption Publication Year Range Last 50 years Remove constraint Publication Year Range: Last 50 years Journal computer journal Remove constraint Journal: computer journal
200 results

Search Results

1. EFTA: An Efficient and Fault-Tolerant Data Aggregation Scheme without TTP in Smart Grid.

2. Guess-and-Determine Attacks on AEGIS.

3. Editorial: On the Security of the First Leakage-Free Certificateless Signcryption Scheme.

4. CM-UTC: A Cost-sensitive Matrix based Method for Unknown Encrypted Traffic Classification.

5. SEDD: Robust Blind Image Watermarking With Single Encoder And Dual Decoders.

6. Privacy-Preserving Confidential Reporting System With Designated Reporters.

7. Optimal Symmetric Ratcheting for Secure Communication.

8. Secure and Differentiated Fog-Assisted Data Access for Internet of Things.

9. Authorized Function Homomorphic Signature.

10. From Consensus to Atomic Broadcast: Time-Free Byzantine-Resistant Protocols without Signatures.

11. Meet-in-the-Middle Attacks on Reduced-Round QARMA-64/128.

12. Improved Meet-in-the Middle Attacks on Reduced-Round TWINE-128.

13. Novel Smooth Hash Proof Systems Based on Lattices.

14. Fully Privacy-Preserving ID-Based Broadcast Encryption with Authorization.

15. A Practical Hybrid Group Key Establishment for Secure Group Communications.

16. A New Framework of IND-CCA Secure Public Key Encryption with Keyword Search.

17. Advanced Security Technologies and Services for Future Computing Environments.

18. Almost-Tight Identity Based Encryption Against Selective Opening Attack.

19. Intrusion Detection Over Encrypted Network Data.

20. An End-to-End Security Approach for Digital Document Management.

21. A Key-Policy Attribute-Based Proxy Re-Encryption Without Random Oracles.

22. Cryptanalysis of a Compact Anonymous HIBE with Constant Size Private Keys.

23. Non-transferable Proxy Re-encryption.

24. Leakage Resilient CCA Security in Stronger Model: Branch Hidden ABO-LTFs and Their Applications.

25. Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability from Simple Assumptions and Its Implementations.

26. Structural Key Recovery of Simple Matrix Encryption Scheme Family.

27. Order-Hiding Range Query over Encrypted Data without Search Pattern Leakage.

28. Tightly Secure Encryption Schemes against Related-Key Attacks.

29. A New Software Birthmark based on Weight Sequences of Dynamic Control Flow Graph for Plagiarism Detection.

30. Klepto for Ring-LWE Encryption.

31. Identity-Based Broadcast Encryption for Inner Products.

32. Bounded Revocable and Outsourceable ABE for Secure Data Sharing.

33. Continuous Leakage-Resilient Identity-Based Encryption without Random Oracles.

34. Efficient Homomorphic Integer Polynomial Evaluation Based on GSW FHE.

35. Efficient Ring Signature and Group Signature Schemes Based on q-ary Identification Protocols.

36. Cryptanalysis of A Pairing-Free Certificateless Signcryption Scheme.

37. Providing Secret Authentication in Clustered Security Architecture for Cloud-Based WBAN.

38. Partitioned Group Password-Based Authenticated Key Exchange.

39. Statistical Cipher Feedback of Stream Ciphers.

40. Authorized Equi-join for Multiple Data Contributors in the PKC-Based Setting.

41. Image and Video Encryption based on Dual Space-Filling Curves.

42. Enforcing Role-Based Access Control for Secure Data Storage in the Cloud.

43. Cheating Immune Threshold Visual Secret Sharing1.

44. Side-Channel Attack Using Meet-in-the-Middle Technique.

45. Probabilistic Visual Cryptography Schemes.

46. Simpler Generic Constructions for Strongly Secure One-round Key Exchange from Weaker Assumptions.

47. Securing Outsourced Data in the Multi-Authority Cloud with Fine-Grained Access Control and Efficient Attribute Revocation.

48. On the Importance of Checking Multivariate Public Key Cryptography for Side-Channel Attacks: The Case of enTTS Scheme.

49. Pairing-Free and Secure Certificateless Signcryption Scheme.

50. Novel Leakage-Resilient Attribute-Based Encryption from Hash Proof System.