Search

Your search keyword '"DATA encryption"' showing total 243 results

Search Constraints

Start Over You searched for: Descriptor "DATA encryption" Remove constraint Descriptor: "DATA encryption" Journal journal of information security & applications Remove constraint Journal: journal of information security & applications
243 results on '"DATA encryption"'

Search Results

1. 3D point cloud encryption algorithm based on hybrid key and spatial maintenance.

2. MinCloud: Trusted and transferable MinHash-based framework for unknown malware detection for Linux cloud environments.

3. High-speed batch verification for discrete-logarithm-based signatures via Multi-Scalar Multiplication Algorithm.

4. [formula omitted]: A blockchain-based secure access control management for the Internet of Things.

5. Reversible data hiding in encrypted images using Pixel Shifting Approach (PSA).

6. SteriCNN: Cloud native stego content sterilization framework.

7. An efficient secure interval test protocol for small integers.

8. Guaranteeing anonymity in attribute-based authorization.

9. Secure outsourced decryption for FHE-based privacy-preserving cloud computing.

10. Fine-grained encrypted data aggregation mechanism with fault tolerance in edge-assisted smart grids.

11. Enhancing privacy-preserving machine learning with self-learnable activation functions in fully homomorphic encryption.

12. Self-sovereign identity management in ciphertext policy attribute based encryption for IoT protocols.

13. Cryptanalysis of Cancelable Biometrics Vault.

14. Shared file protection against unauthorised encryption using a Buffer-Based Signature Verification Method.

15. Post-quantum identity-based traitor tracing.

16. Comprehensively enhancing the security of control with combined homomorphic encryption.

17. Secure similar patients query with homomorphically evaluated thresholds.

18. A different base approach for better efficiency on range proofs.

19. Color image encryption scheme combining a 2D hyperchaotic Sin–Henon system and the division algorithm.

21. Blockchain in inter-organizational collaboration: A privacy-preserving voting system for collective decision-making.

22. Obfuscation undercover: Unraveling the impact of obfuscation layering on structural code patterns.

23. Detecting malicious encrypted traffic with privacy set intersection in cloud-assisted industrial internet.

24. Dynamic-anonymous privacy-preserving authenticated aggregation for safety-warning system for the Internet of Vehicles.

25. Ciphertext policy attribute-based encryption scheme supporting Boolean circuits over ideal lattices.

26. Specifying cycles of minimal length for commonly used linear layers in block ciphers.

27. Statistical privacy protection for secure data access control in cloud.

28. Detecting malicious DoH traffic: Leveraging small sample analysis and adversarial networks for detection.

29. Privacy-preserving geo-tagged image search in edge–cloud computing for IoT.

30. PCPHE: A privacy comparison protocol for vulnerability detection based on homomorphic encryption.

31. Puncturable-based broadcast encryption with tracking for preventing malicious encryptors in cloud file sharing.

32. A Pairing-free Dynamic Multi-receiver Certificateless Authenticated Searchable Encryption for cloud storage.

33. GR-NTRU: Dihedral group over ring of Eisenstein integers.

34. The implementation of polynomial multiplication for lattice-based cryptography: A survey.

35. Designated server proxy re-encryption with boolean keyword search for E-Health Clouds.

36. A randomized encryption deduplication method against frequency attack.

37. An easy-to-implement construction for [formula omitted]-threshold progressive visual secret sharing schemes.

38. A decentralized multi-authority CP-ABE scheme from LWE.

39. Homomorphic encrypted Yara rules evaluation.

40. Fingerprint image encryption based on chaos and nonlinear dynamic "X" model diffusion.

41. On the security of JPEG image encryption with RS pairs permutation.

42. Encryption-based sub-string matching for privacy-preserving record linkage.

43. Quantum image encryption algorithm via optimized quantum circuit and parity bit-plane permutation.

44. An improved simple flexible cryptosystem for 3D objects with texture maps and 2D images.

45. Reversible data hiding in encrypted images with somewhat homomorphic encryption based on sorting block-level prediction-error expansion.

46. Efficient implementation of lightweight block ciphers on volta and pascal architecture.

47. A CCA-secure multi-conditional proxy broadcast re-encryption scheme for cloud storage system.

48. A high capacity reversible data hiding scheme for encrypted covers based on histogram shifting.

49. Secure and efficient arithmetic-based multi-secret image sharing scheme using universal share.

50. Privacy-preserving decentralized ABE for secure sharing of personal health records in cloud storage.

Catalog

Books, media, physical & digital resources