Search

Your search keyword '"56-bit encryption"' showing total 28 results

Search Constraints

Start Over You searched for: Descriptor "56-bit encryption" Remove constraint Descriptor: "56-bit encryption" Journal applied mechanics and materials Remove constraint Journal: applied mechanics and materials
28 results on '"56-bit encryption"'

Search Results

1. Research on General Permutation Encryption Module Based on Chaos Theory

2. A High Rate Parallel Operation Encryption Card Design Base on FPGA

3. Design and Implementation of OTP Base on MD5

4. The Video Encryption Algorithm for H.264 Based on Hyper Chaotic System

5. The Simulation of English Character Encryption Encoding Optimized Communication Model

6. A Hybrid Encryption Scheme for Hadoop Based on Symmetric and Asymmetric Encryption

7. PHR in Cloud Environment Using Enhanced Attribute Based Encryption and Advanced Encryption Standard

8. Research and Implementation of Relational Database Encryption Technology Based on Main Memory Database

9. A Practical Method for Software Encryption

10. Improved RSA Algorithm in Hardware Encryption

11. Research on Access Control Based on CP-ABE Algorithm and Cloud Computing

12. Hierarchical Certificate-Based Encryption: Definition and an Efficient Construction

13. Research and Implementation on Compression, Encryption, Storage and Retrieval System for Massive Data

14. Study on Secure Coding Based Information Encryption

15. Study of Selective Video Encryption for the H.264 Standard

16. Programming and Implementation of File Encryption System Based on Matrix Transformation

17. Research of Secure Data Aggregation in Internet of Things

18. Improvement on a Multi-Channel Broadcast Encryption Scheme

19. Study on AES and its Efficient Implementation on STM32F103 Processor

20. The Research of Hard Disk Encryption System Based on Advanced Encryption Standard Algorithm

21. A Network Identity Authentication Protocol Based on Fingerprint and Probabilistic Encryption of RSA

22. Confidentiality and Integrity Protection Method Based on One Time Encryption

23. Chinese Characters Knapsack Public Key Encryption Algorithm Research

24. An Encryption Algorithm

25. A New Mechanism of Database Encryption

26. Analysis of One Proxy Re-Encryption Scheme

27. Two-Way ID Authentication and Hardware Encryption-Based Security Design of Mobile Hard Disk

28. The Application of Data Encryption in Network Security

Catalog

Books, media, physical & digital resources