Search

Your search keyword '"40-bit encryption"' showing total 2,998 results

Search Constraints

Start Over You searched for: Descriptor "40-bit encryption" Remove constraint Descriptor: "40-bit encryption"
2,998 results on '"40-bit encryption"'

Search Results

201. Cryptanalysis of a High-Definition Image Encryption Based on AES Modification

202. Analysis of classical encryption techniques in cloud computing

203. Development of modified AES algorithm for data security

204. Distance-Based Encryption: How to Embed Fuzziness in Biometric-Based Encryption

205. Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts

206. Breaking an ID-based encryption based on discrete logarithm and factorization problems

207. IRIBE: Intrusion-resilient identity-based encryption

208. A novel chaos-based encryption algorithm over TCP data packet for secure communication

209. Efficient Usage of Cover Free Families in Broadcast Encryption

210. Passwords Management via Split-Key

211. Client side data encryption/decryption for web application

212. Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email

213. Content Based Symmetric Key Algorithm

214. Modified MASK Algorithm for Image Encryption

215. Improving Security in Multi Authority Attribute Based Encryption with Fast Decryption

216. Identity-based encryption with outsourced equality test in cloud computing

217. Fuzzy Logic Based Image Encryption for Confidential Data Transfer Using (2, 2) Secret Sharing Scheme

218. Owner Specified Excessive Access Control for Attribute Based Encryption

219. Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions

220. Study of Wireless Authentication Center with Mixed Encryption in WSN

221. Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits

222. PRIVATE SEARCHING ON STREAMING DATA BASED ON HOMOMORPHIC ENCRYPTION

223. Client-side Encryption for Privacy-sensitive Applications on the Cloud

224. Enhancing the Security of Electronic Medical Records Using Forward Secure Secret Key Encryption Scheme

225. Fully Homomorphic Encryption: Computations with a Blindfold

226. Security of Multi-frame DICOM Images Using XOR Encryption Approach

227. Encryption of Reversible Data Hiding for Better Visibility and High Security

228. Taming Energy Cost of Disk Encryption Software on Data-Intensive Mobile Devices

229. Unconditionally Secure Broadcast Encryption Schemes with Trade-Offs between Communication and Storage

230. A chaotic-cipher-based packet body encryption algorithm for JPEG2000 images

231. AES Based Text Encryption Using 12 Rounds with Dynamic Key Selection

232. Secure and Private Cloud-Based Control Using Semi-Homomorphic Encryption**The work was, in part, supported by a McKenzie Fellowship, ARC grant LP130100605, and Defence Science and Technology Group through the Research Agreement My IP:6288

233. A Secured File Store in Cloud Environment Using Hierarchy Attribute-Based Encryption

234. On the Security of a Universal Cryptocomputer: the Chosen Instruction Attack

235. Enhance the Reliability and Security of AES

236. Symmetric encryption upgrade by introduction of information block on used algorithms in key

237. An Enhanced Image Encryption Scheme using 16 Byte Key

238. Revocable Quantum Timed-Release Encryption

239. Dual trapdoor identity-based encryption with keyword search

240. Public key encryption secure against related-key attacks and key-leakage attacks from extractable hash proofs

241. A novel image encryption algorithm based on chaos and Line map

242. Cryptanalyzing a novel couple images encryption algorithm based on DNA subsequence operation and chaotic system

243. WSES: HIGH SECURED DATA ENCRYPTION AND AUTHENTICATION USING WEAVING, ROTATION AND FLIPPING

244. Data Security and Privacy in Cloud Computing Using Different Encryption Algorithms

245. Cryptanalyzing an image encryption algorithm based on autoblocking and electrocardiography\ud

246. A LIGHT-WEIGHT MUTUAL AUTHENTICATION AND KEY-EXCHANGE PROTOCOL BASED ON ELLIPTICAL CURVE CRYPTOGAPHY FOR ENERGY-CONSTRAINED DEVICES

247. On the security of a class of diffusion mechanisms for image encryption

248. Securely outsourcing the ciphertext-policy attribute-based encryption

249. Function-Private Functional Encryption in the Private-Key Setting

250. Indistinguishability Obfuscation from Functional Encryption

Catalog

Books, media, physical & digital resources