Search

Your search keyword '"hybrid encryption"' showing total 184 results

Search Constraints

Start Over You searched for: Descriptor "hybrid encryption" Remove constraint Descriptor: "hybrid encryption"
184 results on '"hybrid encryption"'

Search Results

101. Efficient Identity-Based Key Encapsulation to Multiple Parties

102. Hybrid Signcryption Schemes with Outsider Security : (Extended Abstract)

103. Building a Cryptovirus Using Microsoft’s Cryptographic API

104. Symmetric Subgroup Membership Problems

105. A Universally Composable Secure Channel Based on the KEM-DEM Framework

106. A New Paradigm of Hybrid Encryption Scheme

109. SECURE HYBRID ENCRYPTION USING ECC IN CLOUDS.

110. Blockchain-based multi-authority revocable data sharing scheme in smart grid.

112. Separations in circular security for arbitrary length key cycles, revisited.

113. A Novel Idea on Multimedia Encryption Using Hybrid Crypto Approach.

114. Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing.

115. Achieving CCA security from DCCA security more efficiently by using the KEM+DEM hybrid paradigm.

116. Using Fully Homomorphic Hybrid Encryption to Minimize Non-interative Zero-Knowledge Proofs.

117. A Hybrid Encryption Scheme for Quantum Secure Video Conferencing Combined with Blockchain.

118. New method of key-dependent message security for asymmetric encryption.

119. A new efficient signcryption scheme in the standard model.

121. A Secure Fine-Grained Access Control Mechanism for Networked Storage Systems.

122. DCCA-Secure Public-Key Encryptions from Hybrid Paradigms.

123. An Intrusion and Random-Number-Leakage Resilient Scheme in Mobile Unattended WSNs.

124. Hybrid and Adaptive Cryptographic-based secure authentication approach in IoT based applications using hybrid encryption.

125. RCCA security for KEM+DEM style hybrid encryptions and a general hybrid paradigm from RCCA-secure KEMs to CCA-secure encryptions.

126. Triple layer image security using bit-shift, chaos, and stream encryption

127. Comment on 'Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption With Verifiable Delegation in Cloud Computing'

128. A NOVEL SECURITY MECHANISM FOR HYBRID ENCRYPTION IN MINERAL MANAGEMENT INFORMATION SYSTEM.

129. SİMETRİK VE ASİMETRİK ŞİFRELEME YÖNTEMLERİNE METOTLAR: ÇIRPILMIŞ VE BİRLEŞİK AKM-VKM.

130. Tag-KEM/DEM: A New Framework for Hybrid Encryption.

131. Cryptoviral extortion using Microsoft's Crypto API.

132. Natural sd-RCCA Secure Public-key Encryptions from Hybrid Paradigms

133. Modern Family: A Revocable Hybrid Encryption Scheme Based on Attribute-Based Encryption, Symmetric Searchable Encryption and SGX

135. Designing generic asymmetric key cryptosystem with message paddings

136. Data Security on Internet of Things Device Using Hybrid Encryption Model

137. A New Rabin-type Trapdoor Permutation Equivalent to Factoring.

138. Hibrit şifreleme algoritması

139. An Enhanced Approach for Security in Database Using Encryption Technology.

141. A New Rabin-type Trapdoor Permutation Equivalent to Factoring

142. Highly efficient method of data protection based on multilayer hybrid encryption

143. MHED – высокоэффективный метод защиты данных на основе многослойного гибридного шифрования

144. MHED – високоефективний метод захисту даних на основі багатошарового гібридного шифрування

145. Secure and Anonymous Hybrid Encryption from Coding Theory

146. An Intrusion and Random-Number-Leakage Resilient Scheme in Mobile Unattended WSNs

147. A Key-Misuse-Resistant Hybrid Encryption Scheme using Terminal Fingerprint

148. An Intrusion and Random-Number-Leakage Resilient Scheme in Mobile Unattended WSNs

149. An Intrusion and Random-Number-Leakage Resilient Scheme in Mobile Unattended WSNs

150. Efficient Identity-Based Key Encapsulation to Multiple Parties

Catalog

Books, media, physical & digital resources