Search

Your search keyword '"DATA encryption"' showing total 211 results

Search Constraints

Start Over You searched for: Descriptor "DATA encryption" Remove constraint Descriptor: "DATA encryption" Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years Journal journal of information security & applications Remove constraint Journal: journal of information security & applications
211 results on '"DATA encryption"'

Search Results

1. A Pairing-free Dynamic Multi-receiver Certificateless Authenticated Searchable Encryption for cloud storage.

2. GR-NTRU: Dihedral group over ring of Eisenstein integers.

3. The implementation of polynomial multiplication for lattice-based cryptography: A survey.

4. Designated server proxy re-encryption with boolean keyword search for E-Health Clouds.

5. A randomized encryption deduplication method against frequency attack.

6. An easy-to-implement construction for [formula omitted]-threshold progressive visual secret sharing schemes.

7. A decentralized multi-authority CP-ABE scheme from LWE.

8. Homomorphic encrypted Yara rules evaluation.

9. Fingerprint image encryption based on chaos and nonlinear dynamic "X" model diffusion.

10. On the security of JPEG image encryption with RS pairs permutation.

11. Encryption-based sub-string matching for privacy-preserving record linkage.

12. Quantum image encryption algorithm via optimized quantum circuit and parity bit-plane permutation.

13. Certificate-based authenticated encryption with keyword search: Enhanced security model and a concrete construction for Internet of Things.

14. Cryptanalysis of cross-coupled chaotic maps multi-image encryption scheme.

15. Batch image encryption using cross image permutation and diffusion.

16. Ciphertext face recognition system based on secure inner product protocol.

17. A novel compression-based 2D-chaotic sine map for enhancing privacy and security of biometric identification systems.

18. System-widely and fine-grained forward secure identity-based signature scheme.

19. Refined statistical attacks against searchable symmetric encryption using non-indexed documents.

20. Deep learning-based biometric image feature extraction for securing medical images through data hiding and joint encryption–compression.

21. Blockchain-based public key encryption with keyword search for medical data sharing in cloud environment.

22. Conditional privacy-preserving authentication scheme for V2V communication without pseudonyms.

23. GAIN: Decentralized Privacy-Preserving Federated Learning.

24. Federated reinforcement learning based intrusion detection system using dynamic attention mechanism.

25. Secret data sharing through coverless video steganography based on bit plane segmentation.

26. A novel blockchain's private key generation mechanism based on facial biometrics and physical unclonable function.

27. A screen-shooting resilient data-hiding algorithm based on two-level singular value decomposition.

28. Role mining under User-Distribution cardinality constraint.

29. A comprehensive survey of cryptography key management systems.

30. DL-2P-DDoSADF: Deep learning-based two-phase DDoS attack detection framework.

31. A data-driven network intrusion detection system using feature selection and deep learning.

32. A provably secure collusion-resistant identity-based proxy re-encryption scheme based on NTRU.

33. Searchable encryption algorithm based on key aggregation of multiple data owners in data sharing.

34. Concurrent encryption and lossless compression using inversion ranks.

35. Multi-party anonymous authentication scheme in heterogeneous network slicing.

36. Efficient identity-based traceable cloud data broadcasting with outsider anonymity and simultaneous individual transmission.

37. A review of different prediction methods for reversible data hiding.

38. Efficient implementation of lightweight block ciphers on volta and pascal architecture.

39. Reversible data hiding in encrypted images with somewhat homomorphic encryption based on sorting block-level prediction-error expansion.

40. An improved simple flexible cryptosystem for 3D objects with texture maps and 2D images.

41. A high capacity reversible data hiding scheme for encrypted covers based on histogram shifting.

42. A CCA-secure multi-conditional proxy broadcast re-encryption scheme for cloud storage system.

43. Secure and efficient arithmetic-based multi-secret image sharing scheme using universal share.

44. Design of compressed sensing fault-tolerant encryption scheme for key sharing in IoT Multi-cloudy environment(s).

45. Privacy-preserving decentralized ABE for secure sharing of personal health records in cloud storage.

46. Efficient identity-based multi-bit proxy re-encryption over lattice in the standard model.

47. Design of a chaos-based encryption scheme for sensor data using a novel logarithmic chaotic map.

48. Reversible data hiding in encrypted image using two-pass pixel value ordering.

49. Searchable encryption over encrypted speech retrieval scheme in cloud storage.

50. VMSE: Verifiable multi-keyword searchable encryption in multi-user setting supporting keywords updating.

Catalog

Books, media, physical & digital resources