Search

Your search keyword '"DATA encryption"' showing total 102 results

Search Constraints

Start Over You searched for: Descriptor "DATA encryption" Remove constraint Descriptor: "DATA encryption" Journal journal of supercomputing Remove constraint Journal: journal of supercomputing Publisher springer nature Remove constraint Publisher: springer nature
102 results on '"DATA encryption"'

Search Results

1. A fuzzy ontology-based context-aware encryption approach in IoT through device and information classification.

2. An encrypted deduplication scheme based on files diversity.

3. Leveraging chaos for enhancing encryption and compression in large cloud data transfers.

4. Quantum circuit implementations of lightweight authenticated encryption ASCON.

5. A three-phase framework for secure storage and sharing of healthcare data based on blockchain, IPFS, proxy re-encryption and group communication.

6. Disruption mitigation in the semiconductors supply chain by using public blockchains.

7. Construction of 24-by-24 nonlinear layer for symmetric algorithm and its application to data encryption in parallel with DNA transform.

8. A robust image steganography based on a novel technique by using improved DNA and modified chaotic approach.

9. Hybrid cryptographic approach to enhance the mode of key management system in cloud environment.

10. A secured internet of robotic things (IoRT) for long-term care services in a smart building.

11. Trust-based secure routing and message delivery protocol for signal processing attacks in IoT applications.

12. Int-Monitor: a model triggered hardware trojan in deep learning accelerators.

13. Distributed storage scheme for encryption speech data based on blockchain and IPFS.

14. An efficient mutual authentication scheme for IoT systems.

15. Searchable encryption on the cloud: a survey.

16. Revocable, dynamic and decentralized data access control in cloud storage.

17. AnonSURP: an anonymous and secure ultralightweight RFID protocol for deployment in internet of vehicles systems.

18. CAVLCU: an efficient GPU-based implementation of CAVLC.

19. A measurement study of offloading virtual network functions to the edge.

20. People-centric collective intelligence: decentralized and enhanced privacy mobile crowd sensing based on blockchain.

21. Cryptosystem design based on Hermitian curves for IoT security.

22. ClaMPP: a cloud-based multi-party privacy preserving classification scheme for distributed applications.

23. A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience.

24. Parallel query execution over encrypted data in database-as-a-service (DaaS).

25. Privacy-aware task data management using TPR*-Tree for trajectory-based crowdsourcing.

26. RCB: leakage-resilient authenticated encryption via re-keying.

27. Design of additive homomorphic encryption with multiple message spaces for secure and practical storage services over encrypted data.

28. Secure IoT framework and 2D architecture for End-To-End security.

29. An automatic RFID reader-to-reader delegation protocol for SCM in cloud computing environment.

30. DigHR: precise dynamic detection of hidden races with weak causal relation analysis.

31. A shareable keyword search over encrypted data in cloud computing.

32. Symmetric searchable encryption with efficient range query using multi-layered linked chains.

33. Watermarking technique based on three-coefficient comparison in DCT domain.

34. A GPU implementation of secret sharing scheme based on cellular automata.

35. Efficient and cryptographically secure generation of chaotic pseudorandom numbers on GPU.

36. Security analysis and improvement of two authentication and key agreement schemes for session initiation protocol.

37. Privacy-aware attribute-based PHR sharing with user accountability in cloud computing.

38. LR-FEAD: leakage-tolerating and attribute-hiding functional encryption mechanism with delegation in affine subspaces.

39. Verifiable computation with access control in cloud computing.

40. Incremental proxy re-encryption scheme for mobile cloud computing environment.

41. A secure wireless communication system integrating RSA, Diffie-Hellman PKDS, intelligent protection-key chains and a Data Connection Core in a 4G environment.

42. Privacy aware image template matching in clouds using ambient data.

43. A scalable encryption scheme for multi-privileged group communications.

44. Enhancing privacy in cloud computing via policy-based obfuscation.

45. A high-performance and scalable multi-core aware software solution for network monitoring.

46. Improving quality of DES S-boxes by cellular automata-based S-boxes.

47. The study on end-to-end security for ubiquitous commerce.

48. Privacy-enhanced Key Recovery in mobile communication environments.

49. The memory behavior of cache oblivious stencil computations.

50. A Parallel Algorithm for determining the inverse of a matrix for use in blockcipher encryption/decryption.

Catalog

Books, media, physical & digital resources