Search

Your search keyword '"DATA encryption"' showing total 381 results

Search Constraints

Start Over You searched for: Descriptor "DATA encryption" Remove constraint Descriptor: "DATA encryption" Search Limiters Peer Reviewed Remove constraint Search Limiters: Peer Reviewed Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years Publisher ieee Remove constraint Publisher: ieee
381 results on '"DATA encryption"'

Search Results

1. A Lightweight Multi-Chaos-Based Image Encryption Scheme for IoT Networks

2. Blockchain-Assisted Hierarchical Attribute-Based Encryption Scheme for Secure Information Sharing in Industrial Internet of Things

3. GeFL: Gradient Encryption-Aided Privacy Preserved Federated Learning for Autonomous Vehicles

4. Efficient Oblivious Query Processing for Range and kNN Queries.

5. Architectural Supports for Block Ciphers in a RISC CPU Core by Instruction Overloading.

6. Fully Homomorphic Enabled Secure Task Offloading and Scheduling System for Transport Applications.

7. Towards Blockchain-Based Secure Storage and Trusted Data Sharing Scheme for IoT Environment

8. Toward Data Security in 6G Networks: A Public-Key Searchable Encryption Approach.

9. An Efficient Ciphertext-Policy Weighted Attribute-Based Encryption for the Internet of Health Things.

10. A Cloud Secure Storage Mechanism Based on Data Dispersion and Encryption

11. On The Security of Block Permutation and Co-XOR in Reversible Data Hiding.

12. A Blockchain Based User Subscription Data Management and Access Control Scheme in Mobile Communication Networks.

13. Preference Preserved Privacy Protection Scheme for Smart Home Network System Based on Information Hiding

14. A Secure Energy-Saving Communication and Encrypted Storage Model Based on RC4 for EHR

15. A CASTLE With TOWERs for Reliable, Secure Phase-Change Memory.

16. Towards Encrypted In-Network Storage Services with Secure Near-Duplicate Detection.

17. Exploiting Process Variations to Secure Photonic NoC Architectures From Snooping Attacks.

18. An Identity-Based and Revocable Data-Sharing Scheme in VANETs.

19. Decentralized Public Key Infrastructures atop Blockchain.

20. Fork Path: Batching ORAM Requests to Remove Redundant Memory Accesses.

21. AES-128 Based Secure Low Power Communication for LoRaWAN IoT Environments

22. Secure Transmission of IoT mHealth Patient Monitoring Data from Remote Areas Using DTN.

23. Resilient Control Design for Load Frequency Control System Under False Data Injection Attacks.

24. Key-Policy Attribute-Based Encryption With Keyword Search in Virtualized Environments.

25. Probabilistic Existence Results for Parent-Identifying Schemes.

26. Enabling Encrypted Rich Queries in Distributed Key-Value Stores.

27. PrivateGraph: Privacy-Preserving Spectral Analysis of Encrypted Graphs in the Cloud.

28. Physical Layer Encryption for Industrial Ethernet in Gigabit Optical Links.

29. A Heuristic Statistical Testing Based Approach for Encrypted Network Traffic Identification.

30. Preventing Scan Attacks on Secure Circuits Through Scan Chain Encryption.

31. Energy-Aware Encryption for Securing Video Transmission in Internet of Multimedia Things.

32. Low Area-Overhead Low-Entropy Masking Scheme (LEMS) Against Correlation Power Analysis Attack.

33. An Energy-Efficient Accelerator Based on Hybrid CPU-FPGA Devices for Password Recovery.

34. Write Deduplication and Hash Mode Encryption for Secure Nonvolatile Main Memory.

35. Achieving Data Truthfulness and Privacy Preservation in Data Markets.

36. Privacy-Preserving Collaborative Model Learning: The Case of Word Vector Training.

37. Identifying and Estimating Persistent Items in Data Streams.

38. Securing Named Data Networking: Attribute-Based Encryption and Beyond.

39. Physical Layer Security Schemes for Full-Duplex Cooperative Systems: State of the Art and Beyond.

40. A Method for Achieving Confidentiality and Integrity in IEC 61850 GOOSE Messages.

41. To Hide Private Position Information in Localization Using Time Difference of Arrival.

42. Design and Evaluation of a Spintronic In-Memory Processing Platform for Nonvolatile Data Encryption.

43. Toward Encrypted Video Tampering Detection and Localization Based on POB Number System Over Cloud.

44. Design and FPGA-Based Realization of a Chaotic Secure Video Communication System.

45. Low-Complexity VLSI Design of Large Integer Multipliers for Fully Homomorphic Encryption.

46. Resource Allocation in Optical Networks Secured by Quantum Key Distribution.

47. Enabling Generic, Verifiable, and Secure Data Search in Cloud Services.

48. Middlebox-Based Packet-Level Redundancy Elimination Over Encrypted Network Traffic.

49. Wavelet-Based Visual Analysis of Dynamic Networks.

50. Perceptual Biases in Font Size as a Data Encoding.

Catalog

Books, media, physical & digital resources