Search

Your search keyword '"DATA encryption"' showing total 508 results

Search Constraints

Start Over You searched for: Descriptor "DATA encryption" Remove constraint Descriptor: "DATA encryption" Search Limiters Available in Library Collection Remove constraint Search Limiters: Available in Library Collection Publisher springer nature Remove constraint Publisher: springer nature
508 results on '"DATA encryption"'

Search Results

1. Blockchain-based proxy re-encryption access control method for biological risk privacy protection of agricultural products.

2. Demonstration of microwave single-shot quantum key distribution.

3. Privacy protection of communication networks using fully homomorphic encryption based on network slicing and attributes.

4. Stochastic switching and analog-state programmable memristor and its utilization for homomorphic encryption hardware.

5. HIDDEn: Robust Data Hiding for Medical Images with Encryption and Local Binary Pattern.

6. A fuzzy ontology-based context-aware encryption approach in IoT through device and information classification.

7. An encrypted deduplication scheme based on files diversity.

8. BGNBA-OCO based privacy preserving attribute based access control with data duplication for secure storage in cloud.

9. Photochromic luminescence of organic crystals arising from subtle molecular rearrangement.

10. Leveraging chaos for enhancing encryption and compression in large cloud data transfers.

11. Efficient intersystem crossing and tunable ultralong organic room-temperature phosphorescence via doping polyvinylpyrrolidone with polyaromatic hydrocarbons.

12. Modified Playfair for Text File Encryption and Meticulous Decryption with Arbitrary Fillers by Septenary Quadrate Pattern.

13. Quantum circuit implementations of lightweight authenticated encryption ASCON.

14. A three-phase framework for secure storage and sharing of healthcare data based on blockchain, IPFS, proxy re-encryption and group communication.

15. Nucleic-acid-base photofunctional cocrystal for information security and antimicrobial applications.

16. Revocable and verifiable weighted attribute-based encryption with collaborative access for electronic health record in cloud.

17. Disruption mitigation in the semiconductors supply chain by using public blockchains.

18. Distributed power analysis attack on SM4 encryption chip.

19. Construction of 24-by-24 nonlinear layer for symmetric algorithm and its application to data encryption in parallel with DNA transform.

20. A robust image steganography based on a novel technique by using improved DNA and modified chaotic approach.

21. Research on privacy and secure storage protection of personalized medical data based on hybrid encryption.

22. Image encryption using binary polarization states of light beam.

23. Quantum authentication method based on key-controlled maximally mixed quantum state encryption.

24. Design of area, energy and security optimized reversible architectures for digital image cryptography.

25. Joint optimisation of drone routing and battery wear for sustainable supply chain development: a mixed-integer programming model based on blockchain-enabled fleet sharing.

26. Hybrid cryptographic approach to enhance the mode of key management system in cloud environment.

27. Random fractal-enabled physical unclonable functions with dynamic AI authentication.

28. Supramolecular glasses with color-tunable circularly polarized afterglow through evaporation-induced self-assembly of chiral metal–organic complexes.

29. Cloud-edge data encryption in the internet of vehicles using Zeckendorf representation.

30. A secured internet of robotic things (IoRT) for long-term care services in a smart building.

31. Trust-based secure routing and message delivery protocol for signal processing attacks in IoT applications.

32. Int-Monitor: a model triggered hardware trojan in deep learning accelerators.

33. A novel image cryptosystem using Gray code, quantum walks, and Henon map for cloud applications.

34. A reconfigurable and compact subpipelined architecture for AES encryption and decryption.

35. Distributed storage scheme for encryption speech data based on blockchain and IPFS.

36. Encryption chain based on measurement result and its applications on semi-quantum key distribution protocol.

37. An enhanced encryption-based security framework in the CPS Cloud.

38. Unraveling trust management in cybersecurity: insights from a systematic literature review.

39. An efficient mutual authentication scheme for IoT systems.

40. Fluorescence-structural color photonic crystal security card based on ultraviolet-responsive core-interlayer-shell colloidal particles.

41. Searchable encryption on the cloud: a survey.

42. Revocable, dynamic and decentralized data access control in cloud storage.

43. AnonSURP: an anonymous and secure ultralightweight RFID protocol for deployment in internet of vehicles systems.

44. CAVLCU: an efficient GPU-based implementation of CAVLC.

46. Application of machine learning in intelligent encryption for digital information of real-time image text under big data.

47. Multi-Recipient encryption with keyword search without pairing for cloud storage.

48. Patent data access control and protection using blockchain technology.

49. Comprehensive deep learning model for 3D color holography.

50. A measurement study of offloading virtual network functions to the edge.

Catalog

Books, media, physical & digital resources