Search

Your search keyword '"DATA encryption"' showing total 89 results

Search Constraints

Start Over You searched for: Descriptor "DATA encryption" Remove constraint Descriptor: "DATA encryption" Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years Journal computer journal Remove constraint Journal: computer journal Database Academic Search Index Remove constraint Database: Academic Search Index
89 results on '"DATA encryption"'

Search Results

1. Template Attack Assisted Linear Cryptanalysis on Outer Rounds Protected DES Implementations.

2. Optimal Symmetric Ratcheting for Secure Communication.

3. Guess-and-Determine Attacks on AEGIS.

4. Secure and Differentiated Fog-Assisted Data Access for Internet of Things.

5. A New Framework of IND-CCA Secure Public Key Encryption with Keyword Search.

6. Intrusion Detection Over Encrypted Network Data.

7. Cryptanalysis of a Compact Anonymous HIBE with Constant Size Private Keys.

8. A Searchable Asymmetric Encryption Scheme with Support for Boolean Queries for Cloud Applications.

9. Non-transferable Proxy Re-encryption.

10. Leakage Resilient CCA Security in Stronger Model: Branch Hidden ABO-LTFs and Their Applications.

11. Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability from Simple Assumptions and Its Implementations.

12. CCA Security for Self-Updatable Encryption: Protecting Cloud Data When Clients Read/Write Ciphertexts.

13. Tightly Secure Encryption Schemes against Related-Key Attacks.

14. Order-Hiding Range Query over Encrypted Data without Search Pattern Leakage.

15. Matrix FHE and Its Application in Optimizing Bootstrapping.

16. Defense Mechanism for Malicious and Selective Forwarding Attacks in Large and Mobile Wireless Networks.

17. Structural Key Recovery of Simple Matrix Encryption Scheme Family.

18. Authorized Function Homomorphic Signature.

19. Improved Meet-in-the Middle Attacks on Reduced-Round TWINE-128.

20. Klepto for Ring-LWE Encryption.

21. A New Software Birthmark based on Weight Sequences of Dynamic Control Flow Graph for Plagiarism Detection.

22. Meet-in-the-Middle Attacks on Reduced-Round QARMA-64/128.

23. Secure and Efficient Attribute-Based Encryption with Keyword Search.

24. A Secure Self-Synchronized Stream Cipher.

25. Identity-Based Broadcast Encryption for Inner Products.

26. Bounded Revocable and Outsourceable ABE for Secure Data Sharing.

27. Efficient Homomorphic Integer Polynomial Evaluation Based on GSW FHE.

28. Continuous Leakage-Resilient Identity-Based Encryption without Random Oracles.

29. Efficient Ring Signature and Group Signature Schemes Based on q-ary Identification Protocols.

30. Cryptanalysis of A Pairing-Free Certificateless Signcryption Scheme.

31. Novel Smooth Hash Proof Systems Based on Lattices.

32. Criteria-Based Encryption.

33. Public-Key Encryption with Tight Simulation-Based Selective-Opening Security.

34. Providing Secret Authentication in Clustered Security Architecture for Cloud-Based WBAN.

35. Partitioned Group Password-Based Authenticated Key Exchange.

36. Statistical Cipher Feedback of Stream Ciphers.

37. Fully Privacy-Preserving ID-Based Broadcast Encryption with Authorization.

38. Authorized Equi-join for Multiple Data Contributors in the PKC-Based Setting.

39. A Practical Hybrid Group Key Establishment for Secure Group Communications.

40. Securing Outsourced Data in the Multi-Authority Cloud with Fine-Grained Access Control and Efficient Attribute Revocation.

41. On the Importance of Checking Multivariate Public Key Cryptography for Side-Channel Attacks: The Case of enTTS Scheme.

42. Pairing-Free and Secure Certificateless Signcryption Scheme.

43. Continuous Leakage-Resilient Public-Key Encryption Scheme with CCA Security.

44. Simpler Generic Constructions for Strongly Secure One-round Key Exchange from Weaker Assumptions.

45. Probabilistic Public Key Encryption for Controlled Equijoin in Relational Databases.

46. Novel Leakage-Resilient Attribute-Based Encryption from Hash Proof System.

47. Bounds for Message Authentication with Distortion.

48. Editorial: On the Security of the First Leakage-Free Certificateless Signcryption Scheme.

49. Identity-Based Encryption with Verifiable Outsourced Revocation.

50. Practical Attribute-based Signature: Traceability and Revocability.

Catalog

Books, media, physical & digital resources