Search

Your search keyword '"Link encryption"' showing total 874 results

Search Constraints

Start Over You searched for: Descriptor "Link encryption" Remove constraint Descriptor: "Link encryption" Topic 40-bit encryption Remove constraint Topic: 40-bit encryption
874 results on '"Link encryption"'

Search Results

1. A Novel Structure of Advance Encryption Standard with 3-Dimensional Dynamic S-box and Key Generation Matrix

2. A Generic Scheme of plaintext-checkable database encryption

3. An encryption algorithm based on combined chaos in body area networks

4. Color image encryption based on chaotic systems and elliptic curve ElGamal scheme

5. Efficient Anonymous Multireceiver Certificateless Encryption

6. Secure and private control using semi-homomorphic encryption

7. Reliable Hardware Architectures for Cryptographic Block Ciphers LED and HIGHT

8. A novel method in audio message encryption based on a mixture of chaos function

9. An efficient symmetric image encryption algorithm based on an intertwining logistic map

10. Efficient and secure identity-based encryption scheme with equality test in cloud computing

11. Secured Transmission of Text using Double Encryption Algorithms

12. A novel approach based on stream cipher for selective speech encryption

13. Fully privacy-preserving and revocable ID-based broadcast encryption for data access control in smart city

14. Local Data Security through Encryption

15. Design and ARM-embedded implementation of a chaotic secure communication scheme based on H.264 selective encryption

16. Transparent encryption with scalable video communication: Lower-latency, CABAC-based schemes

17. A plaintext-related image encryption algorithm based on chaos

18. Security analysis of a novel fusion encryption algorithm based on dna sequence operation and hyper-chaotic system

19. Deniable encryption protocols based on probabilistic public-key encryption

20. Secure and efficient online data storage and sharing over cloud environment using probabilistic with homomorphic encryption

21. Chaos Image Encryption Methods: A Survey Study

22. Self-updatable encryption: Time constrained access control with hidden attributes and better efficiency

23. Light-weight white-box encryption scheme with random padding for wearable consumer electronic devices

24. A resource-efficient encryption algorithm for multimedia big data

25. An efficient mechanism of cryptographic synchronization within selectively encrypted H.265/HEVC video stream

26. Virtualization of the Encryption Card for Trust Access in Cloud Computing

27. Multi-divisible on-line/off-line encryptions

28. Secured Permutation and Substitution Based Image Encryption Algorithm for Medical Security Applications

29. Multi-image encryption using genetic computation

30. Certificateless encryption secure against selective opening attack

31. Compressing Encrypted Data: Achieving Optimality and Strong Secrecy via Permutations

32. Secure searchable encryption: a survey

33. Quantum enigma machine: Experimentally demonstrating quantum data locking

34. TCP-ENO: Encryption Negotiation Option

35. An efficient chaos pseudo-random number generator applied to video encryption

36. A crypto-marking method for secure vector map

37. Image Encryption Based on Compressive Sensing and Scrambled Index for Secure Multimedia Transmission

38. Secure searches in the cloud: A survey

39. Enabled/disabled predicate encryption in clouds

40. Implementation of an improved chaotic encryption algorithm for real-time embedded systems by using a 32-bit microcontroller

41. Efficient identity authentication and encryption technique for high throughput RFID system

42. Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage

43. A secure data routing schema for WSN using Elliptic Curve Cryptography and homomorphic encryption

44. EEE-GSM: End-to-End Encryption Scheme over GSM System

45. Error Control Protocol and Data Encryption Mechanism in the One-Way Network

46. Optical Encryption of a Binary Image by Phase Modulation of the Wavefront

47. Certificate-based encryption resilient to key leakage

48. An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing

49. A new chaos-based image encryption algorithm with dynamic key selection mechanisms

50. An Efficient RC6 based Image Cryptography to Enhance Correlation and Entropy

Catalog

Books, media, physical & digital resources