Search

Your search keyword '"56-bit encryption"' showing total 720 results

Search Constraints

Start Over You searched for: Descriptor "56-bit encryption" Remove constraint Descriptor: "56-bit encryption" Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years
720 results on '"56-bit encryption"'

Search Results

1. Achieving Secure and Efficient Dynamic Searchable Symmetric Encryption over Medical Cloud Data

2. A Novel Structure of Advance Encryption Standard with 3-Dimensional Dynamic S-box and Key Generation Matrix

3. From Cryptomania to Obfustopia Through Secret-Key Functional Encryption

4. A new image encryption technique combining Elliptic Curve Cryptosystem with Hill Cipher

5. Efficient and Expressive Keyword Search Over Encrypted Data in Cloud

6. Chaotic Searchable Encryption for Mobile Cloud Storage

7. A Generic Scheme of plaintext-checkable database encryption

8. Identity-based broadcast encryption with continuous leakage resilience

9. Cryptanalysis and security improvement for a symmetric color image encryption algorithm

10. Attribute‐based broadcast encryption scheme for lightweight devices

11. An image encryption scheme based on elliptic curve pseudo random and Advanced Encryption System

12. Efficient Anonymous Multireceiver Certificateless Encryption

13. Enhancing Security of Cloud Computing by using RC6 Encryption Algorithm

14. Public key encryption resilient to leakage and tampering attacks

15. Criteria-Based Encryption

16. Secure and private control using semi-homomorphic encryption

17. Reliable Hardware Architectures for Cryptographic Block Ciphers LED and HIGHT

18. ENHANCE THE DATA SECURITY BY CHANGINGTHE ENCRYPTION TECHNIQUE BASED ON DATA PATTERN IN BLOCK BASED PRIVATE KEY DATA ENCRYPTION

19. An Efficient Key Policy Attribute Based Encryption Scheme In Cloud Computing

20. Triple Security of Data using Encryption Keys and Image Steganography

21. Public-Key Encryption with Tight Simulation-Based Selective-Opening Security

22. Efficient and secure identity-based encryption scheme with equality test in cloud computing

23. Efficient revocable hierarchical identity-based encryption using cryptographic accumulators

24. Data Control in Cloud Based Encryption

25. Auditing Of Storage Security on Encryption

26. Cryptographic Security using Various Encryption and Decryption Method

27. Fully privacy-preserving and revocable ID-based broadcast encryption for data access control in smart city

28. Encryption of Data Using Radix-64 and Symmetric Key Encryption

29. An optimized DNA based encryption scheme with enforced secure key distribution

30. A multithreaded programming approach for multimedia big data: encryption system

31. Toward single-server private information retrieval protocol via learning with errors

32. Fpga Implementation of Image Encryption and Decryption Using Aes Algorithm Along With Key Encryption

33. An Encryption Key for Secure Authentication: The Dynamic Solution

34. Comparative Study of cryptographic encryption algorithms

35. Local Data Security through Encryption

36. Cryptography Based Light-Weight Attribute Encryption Scheme for Internet of Things

37. Transparent encryption with scalable video communication: Lower-latency, CABAC-based schemes

38. Framework for Visual Cryptographic based Encryption and Decryption

40. Secure and Efficient Data Contribution Using Extended Identity Based Encryption In Cloud Computing

41. A novel location-based encryption model using fuzzy vault scheme

42. Data Security Protection in Cloud Using Encryption and Authentication

43. A new cryptographic method for image encryption

44. Secure and efficient online data storage and sharing over cloud environment using probabilistic with homomorphic encryption

45. Implementation of Advanced Encryption Standard Algorithm with Key Length of 256 Bits for Preventing Data Loss in an Organization

46. Improved, black-box, non-malleable encryption from semantic security

47. How to Protect ADS-B: Confidentiality Framework and Efficient Realization Based on Staged Identity-Based Encryption

48. Chaos Image Encryption Methods: A Survey Study

49. Self-updatable encryption: Time constrained access control with hidden attributes and better efficiency

Catalog

Books, media, physical & digital resources