Search

Your search keyword '"56-bit encryption"' showing total 672 results

Search Constraints

Start Over You searched for: Descriptor "56-bit encryption" Remove constraint Descriptor: "56-bit encryption" Publisher ieee Remove constraint Publisher: ieee
672 results on '"56-bit encryption"'

Search Results

1. Virtualization of the Encryption Card for Trust Access in Cloud Computing

2. On the Security of a Universal Cryptocomputer: the Chosen Instruction Attack

3. Improving Database Security in Cloud Computing by Fragmentation of Data

4. Hidden-Token Searchable Public-Key Encryption

5. Java Source Code Protection Based on JNI and AES Algorithm

6. Location hierarchical access control scheme based on attribute encryption

7. A Lightweight Multi-receiver Encryption Scheme with Mutual Authentication

8. Efficient Format-Preserving Encryption Mode for Integer

9. A Transparent Encryption Scheme of Video Data for Android Devices

10. An Efficient CPA-Secure Encryption Scheme with Equality Test

11. A video encryption service based on cloud computing

12. Policy Based on Homomorphic Encryption and Retrieval Scheme in Cloud Computing

13. Symmetric Key Encryption With Many Secret Keys

14. Emerge: Self-Emerging Data Release Using Cloud Data Storage

15. Advanced Fully Homomorphic Encryption Scheme Over Real Numbers

16. Efficient, Verifiable and Privacy Preserving Decentralized Attribute-Based Encryption for Mobile Cloud Computing

17. Scalable and Reliable Key Management for Secure Deduplication in Cloud Storage

18. Dodrant-homomorphic encryption for cloud databases using table lookup

19. Short CCA-Secure Ciphertext-Policy Attribute-Based Encryption

20. Method for comparative performance analyze of encryption algorithms used in public key infrastructure for secure transmitting of audio information

21. Privacy-preserving online/offline and outsourced multi-authority attribute-based encryption

22. Database Encryption Using Asymmetric Keys: A Case Study

23. Symmetric encryption algorithm using graph representation

24. FPGA implementation and comparison of AES-GCM and Deoxys authenticated encryption schemes

25. Hierarchy attribute-based encryption scheme to support direct revocation in cloud storage

26. An efficient encryption scheme with verifiable outsourced decryption in mobile cloud computing

27. Fully Homomorphic Encryption for Classification in Machine Learning

28. MarkToLock: An image masking security application via insertion of invisible watermark using steganography and Advanced Encryption Standard (AES) algorithm

29. Accelerated encryption algorithms for secure storage and processing in the cloud

30. WSN key management scheme based on fully bomomorphic encryption

31. An Optimal Fully Homomorphic Encryption Scheme

32. Using symmetric and asymmetric cryptography to secure communication between devices in IoT

33. Randomized pseudo-probabilistic encryption algorithms

34. Improving availability and confidentiality of shared data under the multi-cloud environment

35. Non-pairing attribute based encryption scheme based on quadratic residuosity

36. Energy efficient image encryption algorithm

37. Mixed chaotic maps based encryption for high crypto secrecy

38. Towards lightweight Identity-Based Encryption for the post-quantum-secure Internet of Things

39. Enhancing data security of iOS client by encryption algorithm

40. A simple construction of encryption for a tiny domain message

41. Enhancement CAST block algorithm to encrypt big data

42. Identity-based leveled fully homomorphic encryption over ideal lattices

43. A CPA attack against cryptographic hardware implementation on SASEBO-GII

44. Research on scheme of attribute identity authentication system in broadcasting monitoring system

45. Reversible Chaotic Encryption Techniques For Images

46. Unconditionally secure searchable encryption

47. Encryption algorithm using dual modulus

48. Optimizing the Run Time in Mobile Devices

49. Enhanced RSA Algorithm with Varying Key Sizes for Data Security in Cloud

50. A New Logic Encryption Strategy Ensuring Key Interdependency

Catalog

Books, media, physical & digital resources