Search

Your search keyword '"Cryptosystem"' showing total 1,932 results

Search Constraints

Start Over You searched for: Descriptor "Cryptosystem" Remove constraint Descriptor: "Cryptosystem" Topic computer.software_genre Remove constraint Topic: computer.software_genre
1,932 results on '"Cryptosystem"'

Search Results

1. A Secure EMR Sharing System With Tamper Resistance and Expressive Access Control

2. EHRChain: A Blockchain-Based EHR System Using Attribute-Based and Homomorphic Cryptosystem

3. A Blockchain-Based Machine Learning Framework for Edge Services in IIoT

4. Iris based cancelable biometric cryptosystem for secure healthcare smart card

5. Efficient and Secure Identity-based Strong Key-Insulated Signature Scheme without Pairings

6. Proxy-based public-key cryptosystem for secure and efficient IoT-based cloud data sharing in the smart city

7. CL-ME: Efficient Certificateless Matchmaking Encryption for Internet of Things

8. QMLFD Based RSA Cryptosystem for Enhancing Data Security in Public Cloud Storage System

9. Efficient Multi-linear Key Pairing Cryptosystem for Reliable Cloud-based Service Provisioning

10. BSLA: Blockchain-assisted Secure and Lightweight Authentication for SGIN

11. Information security in the post quantum era for 5G and beyond networks: Threats to existing cryptography, and post-quantum cryptography

12. Secure Chaff-less Fuzzy Vault for Face Identification Systems

13. A Blockchain-Enabled Deduplicatable Data Auditing Mechanism for Network Storage Services

14. A Privacy-Preserving Optimization of Neighborhood-Based Recommendation for Medical-Aided Diagnosis and Treatment

15. A Review on Algorithms of Homomorphic Encryption

16. MACHINE LEARNING APPROACH FOR CRYPTOSYSTEM SUGGEST IN EDUCARE OVER CLOUDS

17. LDuAP: lightweight dual auditing protocol to verify data integrity in cloud storage servers

18. Mimosa: Protecting Private Keys Against Memory Disclosure Attacks Using Hardware Transactional Memory

19. PCR and Bio-signature for data confidentiality and integrity in mobile cloud computing

20. EVALUATION OF PERSISTENCE OF STREAMING CRYPTOSYSTEMS OPERATING AS PART OF TELECOMMUNICATIONS MANAGEMENT NETWORK SYSTEM

21. Robust medical image encryption based on DNA-chaos cryptosystem for secure telemedicine and healthcare applications

22. InPPTD: A Lightweight Incentive-Based Privacy-Preserving Truth Discovery for Crowdsensing Systems

23. A novel biometric crypto system based on cryptographic key binding with user biometrics

24. Chaotic Jerk System with Hump Structure for Text and Image Encryption Using DNA Coding

25. Enabling Privacy-Assured Fog-Based Data Aggregation in E-Healthcare Systems

26. Toward Next-Generation Robust Cryptosystems

27. Privacy-preserving and verifiable multi-instance iris remote authentication using public auditor

28. BIOFUSE: A framework for multi-biometric fusion on biocryptosystem level

29. Hyperchaos-Based Cryptosystem for Multimedia Data Security

30. Computational Cost Reduction of Transaction Signing in Blockchain

31. Systematic and Critical Review of RSA Based Public Key Cryptographic Schemes: Past and Present Status

32. An Anonymous Certificateless Signcryption Scheme for Internet of Health Things

33. Modified Vigenere cryptosystem: An integrated data encryption module for learning management system

34. Quantum-Resistant Cryptography for the Internet of Things Based on Location-Based Lattices

35. Cipher Block Chaining Support Vector Machine for Secured Decentralized Cloud Enabled Intelligent IoT Architecture

36. The singularity attack to the multivariate signature scheme HIMQ-3

37. Analysis of Using Blockchain to Protect the Privacy of Drone Big Data

38. Encryption and Re-Randomization Techniques for Malware Propagation

39. Lightweight Encryption Technique to Enhance Medical Image Security on Internet of Medical Things Applications

40. A Conditional Privacy Protection Scheme Based on Ring Signcryption for Vehicular Ad Hoc Networks

41. Lightweight Three-Factor-Based Privacy- Preserving Authentication Scheme for IoT-Enabled Smart Homes

42. PMTER-ABE: a practical multi-authority CP-ABE with traceability, revocation and outsourcing decryption for secure access control in cloud systems

43. Cryptanalysis of Internet of Health Things Encryption Scheme Based on Chaotic Maps

44. ON THE SECURITY COMPARISON OF LUC-TYPE CRYPTOSYSTEMS USING CHOSEN MESSAGE ATTACK

45. Anonymous Certificate-Based Broadcast Encryption With Personalized Messages

46. Efficient and Privacy-Preserving Authentication Protocol for Heterogeneous Systems in IIoT

47. An Efficient RFID Authentication Scheme Based on Elliptic Curve Cryptography for Internet of Things

48. Decentralized Public Key Infrastructures atop Blockchain

49. Implementasi Kriptografi Untuk Keamanan File Text Dengan Menggunakan Metode MD5

50. Efficient ciphertext-policy attribute-based encryption with blackbox traceability

Catalog

Books, media, physical & digital resources