Search

Your search keyword '"Link encryption"' showing total 56 results

Search Constraints

Start Over You searched for: Descriptor "Link encryption" Remove constraint Descriptor: "Link encryption" Language english Remove constraint Language: english
56 results on '"Link encryption"'

Search Results

1. Attribute-Based Encryption Approach for Storage, Sharing and Retrieval of Encrypted Data in the Cloud

2. Cyber Threats to Industrial IoT: A Survey on Attacks and Countermeasures

3. Analysis of Data Encryption Algorithms for Telecommunication Network-Computer Network Communication Security

4. A Novel Structure of Advance Encryption Standard with 3-Dimensional Dynamic S-box and Key Generation Matrix

5. Deniable encryption protocols based on probabilistic public-key encryption

6. A Key Space Enhanced Chaotic Encryption Scheme for Physical Layer Security in OFDM-PON

7. Virtualization of the Encryption Card for Trust Access in Cloud Computing

8. Multi-divisible on-line/off-line encryptions

9. On the Security of a Universal Cryptocomputer: the Chosen Instruction Attack

10. WSES: HIGH SECURED DATA ENCRYPTION AND AUTHENTICATION USING WEAVING, ROTATION AND FLIPPING

11. Securely outsourcing the ciphertext-policy attribute-based encryption

12. Real-Time Selective Encryption Solution based on ROI for MPEG-A Visual Identity Management AF

13. Semantically Secure Symmetric Encryption with Error Correction for Distributed Storage

14. Rastgele veri karıştırmaya dayalı kaotik şifreleme

15. ELmD: A Pipelineable Authenticated Encryption and Its Hardware Implementation

16. Practical Privacy in WDM Networks with All-Optical Layered Encryption

17. Dynamic execution of secure queries over homomorphic encrypted databases

18. An Encryption Technique for Provably Secure Transmission from a High Performance Computing Entity to a Tiny One

19. Power Adaptive Data Encryption for Energy-Efficient and Secure Communication in Solar-Powered Wireless Sensor Networks

20. Geo-specific encryption through implicitly authenticated location for 5G wireless systems

21. Secure Distributed Computation on Private Inputs

23. Stateful Identity-Based Encryption Scheme: FasterEncryption and Decryption

24. Anonymous Multi-Receiver Identity-Based Authenticated Encryption with CCA Security

25. Can We Securely Use CBC Mode in TLS1.0?

26. Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks

27. Experimental scrambling and noise reduction applied to the optical encryption of QR codes

28. Coupling Functions Enable Secure Communications

29. Chaos Based Joint Compression and Encryption Framework for End-to-End Communication Systems

30. An Image Encryption Algorithm Based on Balanced Pixel and Chaotic Map

31. Distributed Key Generation for Encrypted Deduplication: Achieving the Strongest Privacy

32. Generalized Key Delegation for Wildcarded Identity-Based and Inner-Product Encryption

33. Efficient MPEG-2 transport stream encryption method for low processing power mobile devices

34. Image Encryption Using a Lightweight Stream Encryption Algorithm

35. Flexible optical encryption with multiple users and multiple security levels

36. Information authentication using photon-counting double-random-phase encrypted images

37. On Re-use of randomness in broadcast encryption

38. RSA Public-Key Encryption

39. Scalable and efficient provable data possession

40. A novel secure H.264 transcoder using selective encryption

41. Secure Hybrid Encryption from Weakened Key Encapsulation

42. Universally Anonymizable Public-Key Encryption

43. Security analysis of optical encryption

44. Cryptanalysis of a chaotic image encryption method

45. Joint Encryption and Compression of Correlated Sources with Side Information

46. Private predictive analysis on encrypted medical data

47. A Novel Selective Encryption Method for Securing Text Over Mobile Ad Hoc Network

48. Per-hop Data Encryption Protocol for Transmitting Data Securely Over Public Networks

49. Data Encryption and Authetication Using Public Key Approach

50. On the concealability of messages by the williams public-key encryption scheme

Catalog

Books, media, physical & digital resources