Search

Your search keyword '"Link encryption"' showing total 1,208 results

Search Constraints

Start Over You searched for: Descriptor "Link encryption" Remove constraint Descriptor: "Link encryption"
1,208 results on '"Link encryption"'

Search Results

1. T4급 링크 암호에 적합한 암호 동기방식 제안.

2. Attribute-Based Encryption Approach for Storage, Sharing and Retrieval of Encrypted Data in the Cloud

3. Risk Analysis of Information Security Involving Dynamic Agent Network

4. Cyber Threats to Industrial IoT: A Survey on Attacks and Countermeasures

5. Analysis of Data Encryption Algorithms for Telecommunication Network-Computer Network Communication Security

6. The Suitability of RSA for Bulk Data Encryption

7. A Novel Structure of Advance Encryption Standard with 3-Dimensional Dynamic S-box and Key Generation Matrix

8. Lightweight Identity Authentication Scheme Based on IBC Identity Cryptograph

9. Searchable Encryption over Feature-Rich Data

10. A Generic Scheme of plaintext-checkable database encryption

11. An encryption algorithm based on combined chaos in body area networks

12. Color image encryption based on chaotic systems and elliptic curve ElGamal scheme

13. Efficient Anonymous Multireceiver Certificateless Encryption

14. Encryption method based on pseudo random spatial light modulation for single-fibre data transmission

15. Secure and private control using semi-homomorphic encryption

16. Reliable Hardware Architectures for Cryptographic Block Ciphers LED and HIGHT

17. Image encryption algorithm based on Lorenz chaotic map with dynamic secret keys

18. A novel method in audio message encryption based on a mixture of chaos function

19. Sequence aware functional encryption and its application in searchable encryption

20. An efficient symmetric image encryption algorithm based on an intertwining logistic map

21. Efficient and secure identity-based encryption scheme with equality test in cloud computing

22. Secured Transmission of Text using Double Encryption Algorithms

23. A novel approach based on stream cipher for selective speech encryption

24. Fully privacy-preserving and revocable ID-based broadcast encryption for data access control in smart city

25. Local Data Security through Encryption

26. Design and ARM-embedded implementation of a chaotic secure communication scheme based on H.264 selective encryption

27. Transparent encryption with scalable video communication: Lower-latency, CABAC-based schemes

28. A plaintext-related image encryption algorithm based on chaos

29. Security analysis of a novel fusion encryption algorithm based on dna sequence operation and hyper-chaotic system

30. Deniable encryption protocols based on probabilistic public-key encryption

31. Secure and efficient online data storage and sharing over cloud environment using probabilistic with homomorphic encryption

32. How to Protect ADS-B: Confidentiality Framework and Efficient Realization Based on Staged Identity-Based Encryption

33. Chaos Image Encryption Methods: A Survey Study

34. Self-updatable encryption: Time constrained access control with hidden attributes and better efficiency

35. Access control and Encryption of sensitive data using i-Se4GE Algorithm

36. Light-weight white-box encryption scheme with random padding for wearable consumer electronic devices

37. A resource-efficient encryption algorithm for multimedia big data

38. An efficient mechanism of cryptographic synchronization within selectively encrypted H.265/HEVC video stream

39. A Key Space Enhanced Chaotic Encryption Scheme for Physical Layer Security in OFDM-PON

40. Virtualization of the Encryption Card for Trust Access in Cloud Computing

41. Forward-secure identity-based encryption with direct chosen-ciphertext security in the standard model

42. Multi-divisible on-line/off-line encryptions

43. Fuzzy Biometric-Based Encryption for Encrypted Data in the Cloud

44. Research on Access Control and Encryption Transmission of 6LoWPAN

45. Secured Permutation and Substitution Based Image Encryption Algorithm for Medical Security Applications

46. Multi-image encryption using genetic computation

47. Certificateless encryption secure against selective opening attack

48. Compressing Encrypted Data: Achieving Optimality and Strong Secrecy via Permutations

49. Secure searchable encryption: a survey

50. Secure communications via synchronization of Liouvillian chaotic systems

Catalog

Books, media, physical & digital resources