Search

Your search keyword '"Deterministic encryption"' showing total 1,664 results

Search Constraints

Start Over You searched for: Descriptor "Deterministic encryption" Remove constraint Descriptor: "Deterministic encryption" Topic business.industry Remove constraint Topic: business.industry
1,664 results on '"Deterministic encryption"'

Search Results

1. TrustWorker: A Trustworthy and Privacy-Preserving Worker Selection Scheme for Blockchain-Based Crowdsensing

2. Image Encryption Techniques Using Fractal Function : A Review

3. Information Leakage in Encrypted Deduplication via Frequency Analysis

4. Fair Data Transactions Across Private Databases

5. Indistinguishability and Non-deterministic Encryption of the Quantum Safe Multivariate Polynomial Public Key Cryptographic System

6. Periodical key change for cloud mutable security protocol

7. Reversible cellular automata image encryption for similarity search

8. Using Transposition Padding to Get CCA2 Security From Any Deterministic Encryption Schemes

9. Chaos-based image encryption using vertical-cavity surface-emitting lasers

10. On Selective-Opening Security of Deterministic Primitives

11. A Novel Structure of Advance Encryption Standard with 3-Dimensional Dynamic S-box and Key Generation Matrix

12. From Cryptomania to Obfustopia Through Secret-Key Functional Encryption

13. A Secure Model to Execute Queries Over Encrypted Databases in the Cloud

14. Chaotic synchronization cryptosystems combined with RSA encryption algorithm

15. A new image encryption technique combining Elliptic Curve Cryptosystem with Hill Cipher

16. An efficient RSA-based certificateless public key encryption scheme

17. A combination chaotic system and application in color image encryption

18. Deterministic Public-Key Encryption for Adaptively-Chosen Plaintext Distributions

19. A Secure Image Encryption Scheme using Chaos and Wavelet Transformations

20. Real-time and encryption efficiency improvements of simultaneous fusion, compression and encryption method based on chaotic generators

21. A Generic Scheme of plaintext-checkable database encryption

22. Eliminating the texture features in visually meaningful cipher images

23. A novel bit-level image encryption algorithm based on 2D-LICM hyperchaotic map

24. A memristor-based chaotic system and its application in image encryption

25. Exploiting self-adaptive permutation–diffusion and DNA random encoding for secure and efficient image encryption

26. Image encryption using partitioned cellular automata

27. Efficient and Provable Security Searchable Asymmetric Encryption in the Cloud

28. Symmetric and asymmetric hybrid cryptosystem based on compressive sensing and computer generated holography

29. An optimal approach for watermarking using MRC4 encryption scheme

30. Somewhat semantic secure public key encryption with filtered-equality-test in the standard model and its extension to searchable encryption

32. Secure Audio Cryptosystem Using Hashed Image LSB watermarking and Encryption

33. Preserving Encryption Based Data Search

35. Medical image encryption based on improved ElGamal encryption technique

36. Reliable Hardware Architectures for Cryptographic Block Ciphers LED and HIGHT

39. Cryptanalysis of a DNA and chaos based image encryption algorithm

40. Image encryption algorithm based on Lorenz chaotic map with dynamic secret keys

41. Big Data Analysis And Deterministic Encryption Challenges

42. Cryptanalyzing an image encryption algorithm with compound chaotic stream cipher based on perturbation

43. Efficient and secure identity-based encryption scheme with equality test in cloud computing

45. An optimized DNA based encryption scheme with enforced secure key distribution

46. A multithreaded programming approach for multimedia big data: encryption system

47. Demonstration and a practical scheme of the optical asymmetric cryptosystem

48. Enhanced Hybrid Algorithm of Secure and Fast Chaos-based, AES, RSA and ElGamal Cryptosystems

49. Comparative Study of cryptographic encryption algorithms

50. Efficient designated server identity-based encryption with conjunctive keyword search

Catalog

Books, media, physical & digital resources