Search

Your search keyword '"40-bit encryption"' showing total 103 results

Search Constraints

Start Over You searched for: Descriptor "40-bit encryption" Remove constraint Descriptor: "40-bit encryption" Publisher institute of electrical and electronics engineers (ieee) Remove constraint Publisher: institute of electrical and electronics engineers (ieee)
103 results on '"40-bit encryption"'

Search Results

1. Dynamic Multi-Phrase Ranked Search over Encrypted Data with Symmetric Searchable Encryption

2. Flexible Wildcard Searchable Encryption System

3. Achieving Secure and Efficient Dynamic Searchable Symmetric Encryption over Medical Cloud Data

4. Search Ranges Efficiently and Compatibly as Keywords over Encrypted Data

5. Efficient and Expressive Keyword Search Over Encrypted Data in Cloud

6. Audit-Free Cloud Storage via Deniable Attribute-Based Encryption

7. Chaotic Searchable Encryption for Mobile Cloud Storage

8. Efficient Polar Code-Based Physical Layer Encryption Scheme

9. Efficient Anonymous Multireceiver Certificateless Encryption

10. Reliable Hardware Architectures for Cryptographic Block Ciphers LED and HIGHT

11. A Chaotic System Based Image Encryption Scheme with Identical Encryption and Decryption Algorithm

12. Multireceiver Predicate Encryption for Online Social Networks

13. Optimized Identity-Based Encryption from Bilinear Pairing for Lightweight Devices

14. Light-weight white-box encryption scheme with random padding for wearable consumer electronic devices

15. Security Analysis of an ID-Based Two-Server Password-Authenticated Key Exchange

16. A Collaborative Key Management Protocol in Ciphertext Policy Attribute-Based Encryption for Cloud Data Sharing

17. Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things

18. Dynamic Encrypted Data Sharing Scheme Based on Conditional Proxy Broadcast Re-Encryption for Cloud Storage

19. Expressive CP-ABE Scheme for Mobile Devices in IoT Satisfying Constant-Size Keys and Ciphertexts

20. Authentication With Block-Chain Algorithm and Text Encryption Protocol in Calculation of Social Network

21. Deceptive Deletion Triggers Under Coercion

22. Server-Aided Public Key Encryption With Keyword Search

23. Compressing Encrypted Data: Achieving Optimality and Strong Secrecy via Permutations

24. Secure searchable encryption: a survey

25. Efficient Deniably Authenticated Encryption and Its Application to E-Mail

26. Efficient Adaptively Secure IBBE From the SXDH Assumption

27. Cryptographic Hierarchical Access Control for Dynamic Structures

28. An Efficient Predicate Encryption with Constant Pairing Computations and Minimum Costs

29. Efficient security sequencing problem over insecure channel based on homomorphic encryption

30. Adaptively Secure Broadcast Encryption With Constant Ciphertexts

31. Hierarchical Multi-Authority and Attribute-Based Encryption Friend Discovery Scheme in Mobile Social Networks

32. Private Over-Threshold Aggregation Protocols over Distributed Datasets

33. Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage

34. An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing

35. Distance-Based Encryption: How to Embed Fuzziness in Biometric-Based Encryption

36. Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts

37. Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email

38. Owner Specified Excessive Access Control for Attribute Based Encryption

39. Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions

40. Fully Homomorphic Encryption: Computations with a Blindfold

41. Internet-oriented optimization schemes for joint compression and encryption

42. Revisiting Attribute-Based Encryption With Verifiable Outsourced Decryption

43. Attacks on the Authenticated Encryption Mode of Operation PAE

44. Security Analysis on One-to-Many Order Preserving Encryption-Based Cloud Data Search

45. XOR Encryption Versus Phase Encryption, an In-Depth Analysis

46. A Secure Reconfigurable Crypto IC With Countermeasures Against SPA, DPA, and EMA

47. MAVP-FE: Multi-authority vector policy functional encryption with efficient encryption and decryption

48. An Encryption Scheme Using Chaotic Map and Genetic Operations for Wireless Sensor Networks

49. A Hybrid Scheme of Public-Key Encryption and Somewhat Homomorphic Encryption

50. Software Implementation of an Attribute-Based Encryption Scheme

Catalog

Books, media, physical & digital resources