Search

Your search keyword '"DATA encryption"' showing total 207 results

Search Constraints

Start Over You searched for: "DATA encryption" Remove constraint "DATA encryption" Journal journal of supercomputing Remove constraint Journal: journal of supercomputing Publisher springer nature Remove constraint Publisher: springer nature
207 results on '"DATA encryption"'

Search Results

1. Construction of 24-by-24 nonlinear layer for symmetric algorithm and its application to data encryption in parallel with DNA transform.

2. Leveraging chaos for enhancing encryption and compression in large cloud data transfers.

3. Quantum circuit implementations of lightweight authenticated encryption ASCON.

4. A three-phase framework for secure storage and sharing of healthcare data based on blockchain, IPFS, proxy re-encryption and group communication.

5. A fuzzy ontology-based context-aware encryption approach in IoT through device and information classification.

6. Int-Monitor: a model triggered hardware trojan in deep learning accelerators.

7. An encrypted deduplication scheme based on files diversity.

8. Disruption mitigation in the semiconductors supply chain by using public blockchains.

9. Distributed storage scheme for encryption speech data based on blockchain and IPFS.

10. A robust image steganography based on a novel technique by using improved DNA and modified chaotic approach.

11. A secured internet of robotic things (IoRT) for long-term care services in a smart building.

12. Trust-based secure routing and message delivery protocol for signal processing attacks in IoT applications.

13. Searchable encryption on the cloud: a survey.

14. Revocable, dynamic and decentralized data access control in cloud storage.

15. Hybrid cryptographic approach to enhance the mode of key management system in cloud environment.

16. An efficient mutual authentication scheme for IoT systems.

17. AnonSURP: an anonymous and secure ultralightweight RFID protocol for deployment in internet of vehicles systems.

18. CAVLCU: an efficient GPU-based implementation of CAVLC.

19. Parallel query execution over encrypted data in database-as-a-service (DaaS).

20. People-centric collective intelligence: decentralized and enhanced privacy mobile crowd sensing based on blockchain.

21. Offloading data encryption to GPU in database systems.

22. Cryptosystem design based on Hermitian curves for IoT security.

23. RCB: leakage-resilient authenticated encryption via re-keying.

24. Design of additive homomorphic encryption with multiple message spaces for secure and practical storage services over encrypted data.

25. Symmetric searchable encryption with efficient range query using multi-layered linked chains.

26. Watermarking technique based on three-coefficient comparison in DCT domain.

27. LR-FEAD: leakage-tolerating and attribute-hiding functional encryption mechanism with delegation in affine subspaces.

28. Privacy-aware task data management using TPR*-Tree for trajectory-based crowdsourcing.

29. Incremental proxy re-encryption scheme for mobile cloud computing environment.

30. A scalable encryption scheme for multi-privileged group communications.

31. Enhancing privacy in cloud computing via policy-based obfuscation.

32. ClaMPP: a cloud-based multi-party privacy preserving classification scheme for distributed applications.

33. A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience.

34. Secure IoT framework and 2D architecture for End-To-End security.

35. An automatic RFID reader-to-reader delegation protocol for SCM in cloud computing environment.

36. DigHR: precise dynamic detection of hidden races with weak causal relation analysis.

37. A shareable keyword search over encrypted data in cloud computing.

38. A GPU implementation of secret sharing scheme based on cellular automata.

39. Improving quality of DES S-boxes by cellular automata-based S-boxes.

40. Efficient and cryptographically secure generation of chaotic pseudorandom numbers on GPU.

41. Security analysis and improvement of two authentication and key agreement schemes for session initiation protocol.

42. Privacy-aware attribute-based PHR sharing with user accountability in cloud computing.

43. Molecular solutions of the RSA public-key cryptosystem on a DNA-based computer.

44. Privacy-enhanced Key Recovery in mobile communication environments.

45. A Parallel Algorithm for determining the inverse of a matrix for use in blockcipher encryption/decryption.

46. Verifiable computation with access control in cloud computing.

47. A secure wireless communication system integrating RSA, Diffie-Hellman PKDS, intelligent protection-key chains and a Data Connection Core in a 4G environment.

48. Privacy aware image template matching in clouds using ambient data.

49. A measurement study of offloading virtual network functions to the edge.

50. A high-performance and scalable multi-core aware software solution for network monitoring.

Catalog

Books, media, physical & digital resources