Search

Your search keyword '"DATA encryption"' showing total 69 results

Search Constraints

Start Over You searched for: Descriptor "DATA encryption" Remove constraint Descriptor: "DATA encryption" Search Limiters Peer Reviewed Remove constraint Search Limiters: Peer Reviewed Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years Publisher academic press inc. Remove constraint Publisher: academic press inc.
69 results on '"DATA encryption"'

Search Results

1. A forward and backward private oblivious RAM for storage outsourcing on edge-cloud computing.

2. Chaotic discrete Fresnel transform for secure OFDM-PONs.

3. High-efficient and pH-sensitive orange luminescence from silicon-doped carbon dots for information encryption and bio-imaging.

4. PPMCK: Privacy-preserving multi-party computing for K-means clustering.

5. When services computing meets blockchain: Challenges and opportunities.

6. Efficient AES implementation on Sunway TaihuLight supercomputer: A systematic approach.

7. Variational approach for privacy funnel optimization on continuous data.

8. Chaotic Arnold transform and chirp matrix encryption scheme for enhancing the performance and security of OFDM-PON.

9. Cutting-edge cryptography through the lens of secret sharing.

10. Locally recoverable codes from rational maps.

11. A multilevel reversible data hiding scheme in encrypted domain based on LWE.

12. A chaotic modified-DFT encryption scheme for physical layer security and PAPR reduction in OFDM-PON.

13. Reversible visual transformation via exploring the correlations within color images.

14. Efficient and secure searchable encryption protocol for cloud-based Internet of Things.

15. A query privacy-enhanced and secure search scheme over encrypted data in cloud computing.

16. Privacy-preserving anomaly detection in cloud with lightweight homomorphic encryption.

17. ABE with improved auxiliary input for big data security.

18. CDPS: A cryptographic data publishing system.

19. Secure and flexible cloud-assisted association rule mining over horizontally partitioned databases.

20. Optimal PPVO-based reversible data hiding.

21. On the construction of differentially 4-uniform involutions.

22. Functional encryption for cascade automata.

23. ECG encryption and identification based security solution on the Zynq SoC for connected health systems.

24. An approach for physical layer security enhancement and PAPR reduction in OFDM-PON.

25. Separable reversible data hiding in encrypted image based on pixel value ordering and additive homomorphism.

26. Transparent encryption with scalable video communication: Lower-latency, CABAC-based schemes.

27. Tunable data hiding in partially encrypted H.264/AVC videos.

28. No embedding: A novel image cryptosystem for meaningful encryption.

29. An image coding scheme using parallel compressive sensing for simultaneous compression-encryption applications.

30. Joint image compression and encryption based on order-8 alternating transforms.

31. A privacy-preserving content-based image retrieval method in cloud environment.

32. A privacy-preserved full-text retrieval algorithm over encrypted data for cloud storage applications.

33. Accelerated key distribution method for endogenously secure optical communication by synchronized chaotic system based on fiber channel feature.

34. SEMD: Secure and efficient message dissemination with policy enforcement in VANET.

35. Reversible data hiding for encrypted signals by homomorphic encryption and signal energy transfer.

36. Reversible data hiding in Paillier cryptosystem.

37. Improved joint reversible data hiding in encrypted images.

38. Joint fingerprinting and decryption method for color images based on quaternion rotation with cipher quaternion chaining.

39. Efficient luminescence of doped bismuth oxychloride nanophosphors and its surfaces prompted applications.

40. A ROI-based reversible data hiding scheme in encrypted medical images.

41. Robust non-blind color video watermarking using QR decomposition and entropy analysis.

42. Secure multicasting of images via joint privacy-preserving fingerprinting, decryption, and authentication.

43. On multivariable encryption schemes based on simultaneous algebraic Riccati equations over finite fields.

44. An improved scheme for data hiding in encrypted H.264/AVC videos.

45. Combined schemes for signature and encryption: The public-key and the identity-based setting.

46. Secure and controllable [formula omitted]-NN query over encrypted cloud data with key confidentiality.

47. Secure deduplication storage systems supporting keyword search.

48. A fast encryption algorithm of color image based on four-dimensional chaotic system.

49. SecureDL: A privacy preserving deep learning model for image recognition over cloud.

50. Simple Matrix – A Multivariate Public Key Cryptosystem (MPKC) for Encryption.

Catalog

Books, media, physical & digital resources