Search

Your search keyword '"DATA encryption"' showing total 228 results

Search Constraints

Start Over You searched for: Descriptor "DATA encryption" Remove constraint Descriptor: "DATA encryption" Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years Journal journal of information security & applications Remove constraint Journal: journal of information security & applications
228 results on '"DATA encryption"'

Search Results

51. Multi-party anonymous authentication scheme in heterogeneous network slicing.

52. Concurrent encryption and lossless compression using inversion ranks.

53. Efficient identity-based traceable cloud data broadcasting with outsider anonymity and simultaneous individual transmission.

54. A review of different prediction methods for reversible data hiding.

55. An improved simple flexible cryptosystem for 3D objects with texture maps and 2D images.

56. Reversible data hiding in encrypted images with somewhat homomorphic encryption based on sorting block-level prediction-error expansion.

57. Efficient implementation of lightweight block ciphers on volta and pascal architecture.

58. A high capacity reversible data hiding scheme for encrypted covers based on histogram shifting.

59. A CCA-secure multi-conditional proxy broadcast re-encryption scheme for cloud storage system.

60. Secure and efficient arithmetic-based multi-secret image sharing scheme using universal share.

61. Design of compressed sensing fault-tolerant encryption scheme for key sharing in IoT Multi-cloudy environment(s).

62. Privacy-preserving decentralized ABE for secure sharing of personal health records in cloud storage.

63. Efficient identity-based multi-bit proxy re-encryption over lattice in the standard model.

64. Design of a chaos-based encryption scheme for sensor data using a novel logarithmic chaotic map.

65. Cryptographic construction using coupled map lattice as a diffusion model to enhanced security.

66. An efficient and privacy-Preserving pre-clinical guide scheme for mobile eHealthcare.

67. High-uncertainty audio signal encryption based on the Collatz conjecture.

68. An efficient colour image encryption scheme based on 1-D chaotic maps.

69. CSED: Client-Side encrypted deduplication scheme based on proofs of ownership for cloud storage.

70. A multi-shape hybrid symmetric encryption algorithm to thwart attacks based on the knowledge of the used cryptographic suite.

71. Encryption techniques for H.264/AVC videos: A literature review.

72. The benefit of using chaos in key schedule algorithm.

73. Bluetooth Secure Simple Pairing with enhanced security level.

74. A cryptographic model for better information security.

75. Outsourcing private equality tests to the cloud.

76. Functional Signcryption.

77. Novel method for image security system based on improved SCAN method and pixel rotation technique.

78. Reversible data hiding in encrypted image using two-pass pixel value ordering.

79. Searchable encryption over encrypted speech retrieval scheme in cloud storage.

80. VMSE: Verifiable multi-keyword searchable encryption in multi-user setting supporting keywords updating.

81. Fine-grained search and access control in multi-user searchable encryption without shared keys.

82. A novel honeypot based security approach for real-time intrusion detection and prevention systems.

83. A review of image steganalysis techniques for digital forensics.

84. Secure multi–level permutation operation based multiple colour image encryption.

85. A dynamic and non-interactive boolean searchable symmetric encryption in multi-client setting.

86. Secure transmission of multimedia contents over low-power mobile devices.

87. Improving SIEM capabilities through an enhanced probe for encrypted Skype traffic detection.

88. Modeling optimized decoy state protocol for enhanced quantum key distribution.

89. Multi-layer security of color image based on chaotic system combined with RP2DFRFT and Arnold Transform.

90. Analysis of hierarchical identity based encryption schemes and its applicability to computing environments.

91. Design of a proficient hybrid protocol for efficient route discovery and secure data transmission in CEAACK MANETs.

92. IP packet-level encrypted traffic classification using machine learning with a light weight feature engineering method.

93. Dynamic quantum fully homomorphic encryption scheme based on universal quantum circuit.

94. Public key encryption with public-verifiable decryption delegation and its application.

95. A robust and lossless commutative encryption and watermarking algorithm for vector geographic data.

96. Block verifiable dynamic searchable encryption using redactable blockchain.

97. Efficient Secure Privacy Preserving Multi Keywords Rank Search over Encrypted Data in Cloud Computing.

98. Designing attribute-based verifiable data storage and retrieval scheme in cloud computing environment.

99. Scan-free verifiable public-key searchable encryption supporting efficient user updates in distributed systems.

100. Privacy preserving via multi-key homomorphic encryption in cloud computing.

Catalog

Books, media, physical & digital resources