Search

Your search keyword '"Symmetric-key algorithm"' showing total 4,483 results

Search Constraints

Start Over You searched for: Descriptor "Symmetric-key algorithm" Remove constraint Descriptor: "Symmetric-key algorithm"
4,483 results on '"Symmetric-key algorithm"'

Search Results

1. P2AE: Preserving Privacy, Accuracy, and Efficiency in Location-Dependent Mobile Crowdsensing

2. Optimized Security Algorithms for Intelligent and Autonomous Vehicular Transportation Systems

3. Multi-User Dynamic Searchable Symmetric Encryption With Corrupted Participants

4. The state-of-the-art Boolean Satisfiability based cryptanalysis

5. Verifiable and Dynamic Multi-Keyword Search Over Encrypted Cloud Data Using Bitmap

6. Verifiable Multikeyword Search Encryption Scheme With Anonymous Key Generation for Medical Internet of Things

7. SeUpdate: Secure Encrypted Data Update for Multi-User Environments

8. VFIRM: Verifiable Fine-Grained Encrypted Image Retrieval in Multi-Owner Multi-User Settings

9. Towards Multi-Client Forward Private Searchable Symmetric Encryption in Cloud Computing

10. Sensing as a service in Internet of Things: Efficient authentication and key agreement scheme

11. Secure Similarity Search Over Encrypted Non-Uniform Datasets

12. EAFS: An Efficient, Accurate, and Forward Secure Searchable Encryption Scheme Supporting Range Search

13. A Blockchain-Based Shamir’s Threshold Cryptography Scheme for Data Protection in Industrial Internet of Things Settings

14. A computational algebraic geometry approach to analyze pseudo-random sequences based on Latin squares.

15. Eurus: Towards an Efficient Searchable Symmetric Encryption With Size Pattern Protection

16. A Secure Cloud Data Sharing Protocol for Enterprise Supporting Hierarchical Keyword Search

17. Towards Secure and Efficient Equality Conjunction Search Over Outsourced Databases

18. A Review of Quantum Key Distribution Protocols in the Perspective of Smart Grid Communication Security

19. A feature adaptive image watermarking framework based on Phase Congruency and Symmetric Key Cryptography

20. Envy-free matchings in bipartite graphs and their applications to fair division

21. A Sensing Device with the Optical Temperature Sensors-Based Quad-RX Module and a Security Module

23. Forward and Backward-Secure Range-Searchable Symmetric Encryption

24. Non-Triangular Self-Synchronizing Stream Ciphers

25. BDNA-A DNA inspired symmetric key cryptographic technique to secure cloud computing

26. Achieve Efficient and Verifiable Conjunctive and Fuzzy Queries over Encrypted Data in Cloud

27. A chaos-based probabilistic block cipher for image encryption

28. Enabling Verifiable and Dynamic Ranked Search over Outsourced Data

29. Forward and Backward Private DSSE for Range Queries

30. Iris based cancelable biometric cryptosystem for secure healthcare smart card

31. Chaotic and random neural network cipher for in-vehicle network security

32. Verifiable and Secure SVM Classification for Cloud-Based Health Monitoring Services

33. An image encryption scheme based on finite-time cluster synchronization of two-layer complex dynamic networks

34. Design and implementation of transaction privacy by virtue of ownership and traceability in blockchain based supply chain

35. A new quantum cryptanalysis method on block cipher Camellia

36. FPGA Implementations of 256-Bit SNOW Stream Ciphers for Postquantum Mobile Security

37. A Secure Searchable Encryption Framework for Privacy-Critical Cloud Storage Services

38. SM algorithms-based encryption scheme for large genomic data files

39. SQCA: symmetric key-based crypto-codec for secure nano-communication using QCA

40. Image Encryption Using Value-Differencing Transformation and Modified ZigZag Transformation

41. Secure and efficient authentication protocol with user untraceability for global roaming services

42. A group key-based lightweight Mutual Authentication and Key Agreement (MAKA) protocol for multi-server environment

43. A combined method of formation of a cryptographic key with secret modification of the results of synchronization of artificial neural networks

44. Forward and backward secure keyword search with flexible keyword shielding

45. Performance Evaluation of Symmetric Cryptographic Algorithms in resource constrained hardware for Wireless Sensor Networks

46. Lightweight Searchable Public-Key Encryption with Forward Privacy over IIoT Outsourced Data

47. Avalanche effect and bit independence criterion of perfectly secure Shannon cipher based on matrix power

48. GPU-Accelerated implementation of a genetically optimized image encryption algorithm

49. Rainbow Signature Scheme to Secure GOOSE Communications From Quantum Computer Attacks

50. A Lightweight Privacy-Aware IoT-Based Metering Scheme for Smart Industrial Ecosystems

Catalog

Books, media, physical & digital resources