Search

Your search keyword '"56-bit encryption"' showing total 1,586 results

Search Constraints

Start Over You searched for: Descriptor "56-bit encryption" Remove constraint Descriptor: "56-bit encryption" Topic computer Remove constraint Topic: computer
1,586 results on '"56-bit encryption"'

Search Results

1. Achieving Secure and Efficient Dynamic Searchable Symmetric Encryption over Medical Cloud Data

2. A Novel Structure of Advance Encryption Standard with 3-Dimensional Dynamic S-box and Key Generation Matrix

3. From Cryptomania to Obfustopia Through Secret-Key Functional Encryption

4. Efficient and Expressive Keyword Search Over Encrypted Data in Cloud

5. Chaotic Searchable Encryption for Mobile Cloud Storage

6. A Generic Scheme of plaintext-checkable database encryption

7. Identity-based broadcast encryption with continuous leakage resilience

8. Attribute‐based broadcast encryption scheme for lightweight devices

9. Efficient Anonymous Multireceiver Certificateless Encryption

10. Enhancing Security of Cloud Computing by using RC6 Encryption Algorithm

11. Public key encryption resilient to leakage and tampering attacks

12. Criteria-Based Encryption

13. Secure and private control using semi-homomorphic encryption

14. Reliable Hardware Architectures for Cryptographic Block Ciphers LED and HIGHT

15. ENHANCE THE DATA SECURITY BY CHANGINGTHE ENCRYPTION TECHNIQUE BASED ON DATA PATTERN IN BLOCK BASED PRIVATE KEY DATA ENCRYPTION

16. An Efficient Key Policy Attribute Based Encryption Scheme In Cloud Computing

17. Triple Security of Data using Encryption Keys and Image Steganography

18. Public-Key Encryption with Tight Simulation-Based Selective-Opening Security

19. Efficient and secure identity-based encryption scheme with equality test in cloud computing

20. Efficient revocable hierarchical identity-based encryption using cryptographic accumulators

21. Data Control in Cloud Based Encryption

22. Auditing Of Storage Security on Encryption

23. Cryptographic Security using Various Encryption and Decryption Method

24. Fully privacy-preserving and revocable ID-based broadcast encryption for data access control in smart city

25. Encryption of Data Using Radix-64 and Symmetric Key Encryption

26. An optimized DNA based encryption scheme with enforced secure key distribution

27. Fpga Implementation of Image Encryption and Decryption Using Aes Algorithm Along With Key Encryption

28. An Encryption Key for Secure Authentication: The Dynamic Solution

29. Local Data Security through Encryption

30. Cryptography Based Light-Weight Attribute Encryption Scheme for Internet of Things

31. Transparent encryption with scalable video communication: Lower-latency, CABAC-based schemes

32. Framework for Visual Cryptographic based Encryption and Decryption

34. Secure and Efficient Data Contribution Using Extended Identity Based Encryption In Cloud Computing

35. A novel location-based encryption model using fuzzy vault scheme

36. Data Security Protection in Cloud Using Encryption and Authentication

37. A new cryptographic method for image encryption

38. Secure and efficient online data storage and sharing over cloud environment using probabilistic with homomorphic encryption

39. Implementation of Advanced Encryption Standard Algorithm with Key Length of 256 Bits for Preventing Data Loss in an Organization

40. How to Protect ADS-B: Confidentiality Framework and Efficient Realization Based on Staged Identity-Based Encryption

41. Chaos Image Encryption Methods: A Survey Study

42. Self-updatable encryption: Time constrained access control with hidden attributes and better efficiency

44. Light-weight white-box encryption scheme with random padding for wearable consumer electronic devices

45. Security Analysis of an ID-Based Two-Server Password-Authenticated Key Exchange

47. A resource-efficient encryption algorithm for multimedia big data

48. Security enhancement for AES encrypted speech in communications

49. An efficient mechanism of cryptographic synchronization within selectively encrypted H.265/HEVC video stream

50. An Efficient Quantum Somewhat Homomorphic Symmetric Searchable Encryption

Catalog

Books, media, physical & digital resources