Search

Your search keyword '"56-bit encryption"' showing total 1,569 results

Search Constraints

Start Over You searched for: Descriptor "56-bit encryption" Remove constraint Descriptor: "56-bit encryption" Topic computer.software_genre Remove constraint Topic: computer.software_genre
1,569 results on '"56-bit encryption"'

Search Results

1. Achieving Secure and Efficient Dynamic Searchable Symmetric Encryption over Medical Cloud Data

2. A Novel Structure of Advance Encryption Standard with 3-Dimensional Dynamic S-box and Key Generation Matrix

3. Efficient and Expressive Keyword Search Over Encrypted Data in Cloud

4. Chaotic Searchable Encryption for Mobile Cloud Storage

5. A Generic Scheme of plaintext-checkable database encryption

6. Identity-based broadcast encryption with continuous leakage resilience

7. Attribute‐based broadcast encryption scheme for lightweight devices

8. Efficient Anonymous Multireceiver Certificateless Encryption

9. Enhancing Security of Cloud Computing by using RC6 Encryption Algorithm

10. Public key encryption resilient to leakage and tampering attacks

11. Criteria-Based Encryption

12. Secure and private control using semi-homomorphic encryption

13. Reliable Hardware Architectures for Cryptographic Block Ciphers LED and HIGHT

14. ENHANCE THE DATA SECURITY BY CHANGINGTHE ENCRYPTION TECHNIQUE BASED ON DATA PATTERN IN BLOCK BASED PRIVATE KEY DATA ENCRYPTION

15. An Efficient Key Policy Attribute Based Encryption Scheme In Cloud Computing

16. Triple Security of Data using Encryption Keys and Image Steganography

17. Public-Key Encryption with Tight Simulation-Based Selective-Opening Security

18. Efficient and secure identity-based encryption scheme with equality test in cloud computing

19. Efficient revocable hierarchical identity-based encryption using cryptographic accumulators

20. Data Control in Cloud Based Encryption

21. Auditing Of Storage Security on Encryption

22. Cryptographic Security using Various Encryption and Decryption Method

23. Fully privacy-preserving and revocable ID-based broadcast encryption for data access control in smart city

24. Encryption of Data Using Radix-64 and Symmetric Key Encryption

25. An optimized DNA based encryption scheme with enforced secure key distribution

26. Fpga Implementation of Image Encryption and Decryption Using Aes Algorithm Along With Key Encryption

27. An Encryption Key for Secure Authentication: The Dynamic Solution

28. Local Data Security through Encryption

29. Cryptography Based Light-Weight Attribute Encryption Scheme for Internet of Things

30. Transparent encryption with scalable video communication: Lower-latency, CABAC-based schemes

31. Framework for Visual Cryptographic based Encryption and Decryption

33. Secure and Efficient Data Contribution Using Extended Identity Based Encryption In Cloud Computing

34. A novel location-based encryption model using fuzzy vault scheme

35. Data Security Protection in Cloud Using Encryption and Authentication

36. A new cryptographic method for image encryption

37. Secure and efficient online data storage and sharing over cloud environment using probabilistic with homomorphic encryption

38. Implementation of Advanced Encryption Standard Algorithm with Key Length of 256 Bits for Preventing Data Loss in an Organization

39. How to Protect ADS-B: Confidentiality Framework and Efficient Realization Based on Staged Identity-Based Encryption

40. Chaos Image Encryption Methods: A Survey Study

41. Self-updatable encryption: Time constrained access control with hidden attributes and better efficiency

43. Light-weight white-box encryption scheme with random padding for wearable consumer electronic devices

44. Security Analysis of an ID-Based Two-Server Password-Authenticated Key Exchange

46. A resource-efficient encryption algorithm for multimedia big data

47. Security enhancement for AES encrypted speech in communications

48. An efficient mechanism of cryptographic synchronization within selectively encrypted H.265/HEVC video stream

49. An Efficient Quantum Somewhat Homomorphic Symmetric Searchable Encryption

50. Cryptographic key protection against FROST for mobile devices

Catalog

Books, media, physical & digital resources