Search

Your search keyword '"56-bit encryption"' showing total 1,784 results

Search Constraints

Start Over You searched for: Descriptor "56-bit encryption" Remove constraint Descriptor: "56-bit encryption" Topic computer science Remove constraint Topic: computer science
1,784 results on '"56-bit encryption"'

Search Results

1. Achieving Secure and Efficient Dynamic Searchable Symmetric Encryption over Medical Cloud Data

2. A Novel Structure of Advance Encryption Standard with 3-Dimensional Dynamic S-box and Key Generation Matrix

3. From Cryptomania to Obfustopia Through Secret-Key Functional Encryption

4. A new image encryption technique combining Elliptic Curve Cryptosystem with Hill Cipher

5. Efficient and Expressive Keyword Search Over Encrypted Data in Cloud

6. Chaotic Searchable Encryption for Mobile Cloud Storage

7. A Generic Scheme of plaintext-checkable database encryption

8. Cryptanalysis and security improvement for a symmetric color image encryption algorithm

9. Attribute‐based broadcast encryption scheme for lightweight devices

10. Enhancing Security of Cloud Computing by using RC6 Encryption Algorithm

11. Criteria-Based Encryption

12. Secure and private control using semi-homomorphic encryption

13. Reliable Hardware Architectures for Cryptographic Block Ciphers LED and HIGHT

14. ENHANCE THE DATA SECURITY BY CHANGINGTHE ENCRYPTION TECHNIQUE BASED ON DATA PATTERN IN BLOCK BASED PRIVATE KEY DATA ENCRYPTION

15. An Efficient Key Policy Attribute Based Encryption Scheme In Cloud Computing

16. Triple Security of Data using Encryption Keys and Image Steganography

17. Public-Key Encryption with Tight Simulation-Based Selective-Opening Security

18. Efficient and secure identity-based encryption scheme with equality test in cloud computing

19. Efficient revocable hierarchical identity-based encryption using cryptographic accumulators

20. Data Control in Cloud Based Encryption

21. Auditing Of Storage Security on Encryption

22. Cryptographic Security using Various Encryption and Decryption Method

23. Fully privacy-preserving and revocable ID-based broadcast encryption for data access control in smart city

24. Encryption of Data Using Radix-64 and Symmetric Key Encryption

25. An optimized DNA based encryption scheme with enforced secure key distribution

26. A multithreaded programming approach for multimedia big data: encryption system

27. Toward single-server private information retrieval protocol via learning with errors

28. Fpga Implementation of Image Encryption and Decryption Using Aes Algorithm Along With Key Encryption

29. An Encryption Key for Secure Authentication: The Dynamic Solution

30. Comparative Study of cryptographic encryption algorithms

31. Local Data Security through Encryption

32. Cryptography Based Light-Weight Attribute Encryption Scheme for Internet of Things

33. Transparent encryption with scalable video communication: Lower-latency, CABAC-based schemes

34. Framework for Visual Cryptographic based Encryption and Decryption

36. Secure and Efficient Data Contribution Using Extended Identity Based Encryption In Cloud Computing

37. A novel location-based encryption model using fuzzy vault scheme

38. Data Security Protection in Cloud Using Encryption and Authentication

39. A new cryptographic method for image encryption

40. Secure and efficient online data storage and sharing over cloud environment using probabilistic with homomorphic encryption

41. Implementation of Advanced Encryption Standard Algorithm with Key Length of 256 Bits for Preventing Data Loss in an Organization

42. Chaos Image Encryption Methods: A Survey Study

43. Self-updatable encryption: Time constrained access control with hidden attributes and better efficiency

45. Increasing robustness of data encryption standard by integrating DNA cryptography

46. Encoding Algorithm using Bit Level Encryption and Decryption Technique

47. Light-weight white-box encryption scheme with random padding for wearable consumer electronic devices

48. Efficient Chosen-Ciphertext Secure Encryption from R-LWE

49. Security Analysis of an ID-Based Two-Server Password-Authenticated Key Exchange

Catalog

Books, media, physical & digital resources