Search

Your search keyword '"DATA encryption"' showing total 22 results

Search Constraints

Start Over You searched for: Descriptor "DATA encryption" Remove constraint Descriptor: "DATA encryption" Topic data privacy Remove constraint Topic: data privacy Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years Journal journal of information security & applications Remove constraint Journal: journal of information security & applications
22 results on '"DATA encryption"'

Search Results

1. Detecting malicious encrypted traffic with privacy set intersection in cloud-assisted industrial internet.

2. Statistical privacy protection for secure data access control in cloud.

3. Dynamic-anonymous privacy-preserving authenticated aggregation for safety-warning system for the Internet of Vehicles.

4. PCPHE: A privacy comparison protocol for vulnerability detection based on homomorphic encryption.

5. Designated server proxy re-encryption with boolean keyword search for E-Health Clouds.

6. A Pairing-free Dynamic Multi-receiver Certificateless Authenticated Searchable Encryption for cloud storage.

7. Ciphertext face recognition system based on secure inner product protocol.

8. A novel compression-based 2D-chaotic sine map for enhancing privacy and security of biometric identification systems.

9. Blockchain-based public key encryption with keyword search for medical data sharing in cloud environment.

10. Conditional privacy-preserving authentication scheme for V2V communication without pseudonyms.

11. Role mining under User-Distribution cardinality constraint.

12. GAIN: Decentralized Privacy-Preserving Federated Learning.

13. A comprehensive survey of cryptography key management systems.

14. A data-driven network intrusion detection system using feature selection and deep learning.

15. A provably secure collusion-resistant identity-based proxy re-encryption scheme based on NTRU.

16. A screen-shooting resilient data-hiding algorithm based on two-level singular value decomposition.

17. Fully Enhanced Homomorphic Encryption algorithm of MORE approach for real world applications.

18. Toward single-server private information retrieval protocol via learning with errors.

19. Dual-server certificateless public key encryption with authorized equality test for outsourced IoT data.

20. An efficient and practical approach for privacy-preserving Naive Bayes classification.

21. Deniable search of encrypted cloud-storage data.

22. A party-adaptive variant of LowGear.

Catalog

Books, media, physical & digital resources