Search

Your search keyword '"DATA encryption"' showing total 95 results

Search Constraints

Start Over You searched for: Descriptor "DATA encryption" Remove constraint Descriptor: "DATA encryption" Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years Journal computer journal Remove constraint Journal: computer journal Database Academic Search Index Remove constraint Database: Academic Search Index
95 results on '"DATA encryption"'

Search Results

51. Probabilistic Public Key Encryption for Controlled Equijoin in Relational Databases.

52. Novel Leakage-Resilient Attribute-Based Encryption from Hash Proof System.

53. Bounds for Message Authentication with Distortion.

54. Editorial: On the Security of the First Leakage-Free Certificateless Signcryption Scheme.

55. A Secure Role-Based Cloud Storage System For Encrypted Patient-Centric Health Records.

56. Practical Attribute-based Signature: Traceability and Revocability.

57. RKA-Secure Public Key Encryptions Against Efficiently Invertible Functions.

58. Identity-Based Encryption with Verifiable Outsourced Revocation.

59. Almost-Tight Identity Based Encryption Against Selective Opening Attack.

60. Hybrid Multi-Biometric Template Protection Using Watermarking.

61. Revocable and Decentralized Attribute-Based Encryption.

62. An End-to-End Security Approach for Digital Document Management.

63. Practical Attribute-Based Encryption: Traitor Tracing, Revocation and Large Universe.

64. A Leakage-Resilient CCA-Secure Identity-Based Encryption Scheme.

65. A Key-Policy Attribute-Based Proxy Re-Encryption Without Random Oracles.

66. RGB, a Mixed Multivariate Signature Scheme.

67. Efficient Generic Construction of CCA-Secure Identity-Based Encryption from Randomness Extraction.

68. Token-Leakage Tolerant and Vector Obfuscated IPE and Application in Privacy-Preserving Two-Party Point/Polynomial Evaluations.

69. Compact Anonymous Hierarchical Identity-Based Encryption with Constant Size Private Keys.

70. Forward-Secure Threshold Attribute-Based Signature Scheme.

71. Enhancing an Embedded Processor Core for Efficient and Isolated Execution of Cryptographic Algorithms.

72. Revisiting Security Against the Arbitrator in Optimistic Fair Exchange.

73. Leakage-Free and Provably Secure Certificateless Signcryption Scheme Using Bilinear Pairings.

74. Privacy-Preserving Query Processing by Multi-Party Computation.

75. Fully Secure Wicked Identity-Based Encryption Against Key Leakage Attacks.

76. A Generic Method for the Analysis of a Class of Cache Attacks: A Case Study for AES.

77. Public-Key Encryption Schemes with Bounded CCA Security and Optimal Ciphertext Length Based on the CDH and HDH Assumptions.

78. Efficient and Fully CCA Secure Conditional Proxy Re-Encryption from Hierarchical Identity-Based Encryption.

79. Generalized Random Grid-Based Visual Secret Sharing for General Access Structures.

80. Generic Construction of Certificate-Based Encryption from Certificateless Encryption Revisited.

81. Cryptanalysis of WG Family of Stream Ciphers.

82. Revocable Group Signature with Constant-Size Revocation List.

83. PKE-AET: Public Key Encryption with Authorized Equality Test.

84. S-DIRECT: Scalable and Dynamically Reconfigurable TCAM Architecture for High-Speed IP Lookup.

85. From Ephemerizer to Timed-Ephemerizer: Achieve Assured Lifecycle Enforcement for Sensitive Data.

86. Public Key Encryption with Delegated Equality Test in a Multi-User Setting.

87. Efficient Identity-Based Proxy Signature in the Standard Model.

88. Functional Encryption Resilient to Hard-to-Invert Leakage.

89. Extend the Concept of Public Key Encryption with Delegated Search.

90. Automated Proofs for Computational Indistinguishability.

91. On Unconditional ϵ-Security of Private Key Encryption.

92. Signcryption Secure Against Linear Related-Key Attacks.

93. CCA-Secure IB-KEM from Identity-Based Extractable Hash Proof System†.

94. Comments on 'Efficient Revocable Certificateless Encryption Secure in the Standard Model'.

95. Insecurity of an Efficient Identity-Based Proxy Signature in the Standard Model.

Catalog

Books, media, physical & digital resources