Search

Your search keyword '"56-bit encryption"' showing total 120 results

Search Constraints

Start Over You searched for: Descriptor "56-bit encryption" Remove constraint Descriptor: "56-bit encryption" Publisher elsevier bv Remove constraint Publisher: elsevier bv
120 results on '"56-bit encryption"'

Search Results

1. A Generic Scheme of plaintext-checkable database encryption

2. Identity-based broadcast encryption with continuous leakage resilience

3. Cryptanalysis and security improvement for a symmetric color image encryption algorithm

4. An image encryption scheme based on elliptic curve pseudo random and Advanced Encryption System

5. Public key encryption resilient to leakage and tampering attacks

6. Secure and private control using semi-homomorphic encryption

7. Efficient and secure identity-based encryption scheme with equality test in cloud computing

8. Toward single-server private information retrieval protocol via learning with errors

9. Transparent encryption with scalable video communication: Lower-latency, CABAC-based schemes

10. Self-updatable encryption: Time constrained access control with hidden attributes and better efficiency

11. Improvement of Advanced Encryption Standard Algorithm With Shift Row and S.Box Modification Mapping in Mix Column

12. Fast Cloud-RSA Scheme for Promoting Data Confidentiality in the Cloud Computing

13. Semi-generic construction of public key encryption and identity-based encryption with equality test

14. An efficient chaos pseudo-random number generator applied to video encryption

15. Secure searches in the cloud: A survey

16. Enabled/disabled predicate encryption in clouds

17. Memory leakage-resilient searchable symmetric encryption

18. Implementation of an improved chaotic encryption algorithm for real-time embedded systems by using a 32-bit microcontroller

19. Continuous leakage-resilient certificate-based encryption

20. A secure data routing schema for WSN using Elliptic Curve Cryptography and homomorphic encryption

21. Certificate-based encryption resilient to key leakage

22. Constructions of dynamic and non-dynamic threshold public-key encryption schemes with decryption consistency

23. IRIBE: Intrusion-resilient identity-based encryption

24. Client side data encryption/decryption for web application

25. Content Based Symmetric Key Algorithm

26. Improving Security in Multi Authority Attribute Based Encryption with Fast Decryption

27. Identity-based encryption with outsourced equality test in cloud computing

28. Fuzzy Logic Based Image Encryption for Confidential Data Transfer Using (2, 2) Secret Sharing Scheme

29. Client-side Encryption for Privacy-sensitive Applications on the Cloud

30. Encryption of Reversible Data Hiding for Better Visibility and High Security

31. Taming Energy Cost of Disk Encryption Software on Data-Intensive Mobile Devices

32. A chaotic-cipher-based packet body encryption algorithm for JPEG2000 images

33. AES Based Text Encryption Using 12 Rounds with Dynamic Key Selection

34. Secure and Private Cloud-Based Control Using Semi-Homomorphic Encryption**The work was, in part, supported by a McKenzie Fellowship, ARC grant LP130100605, and Defence Science and Technology Group through the Research Agreement My IP:6288

35. A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing

36. Parallel search over encrypted data under attribute based encryption on the Cloud Computing

37. A novel authenticated encryption scheme and its extension

38. Fully secure anonymous spatial encryption under affine space delegation functionality revisited

39. Simple Matrix – A Multivariate Public Key Cryptosystem (MPKC) for Encryption

40. Anonymous protocols: Notions and equivalence

41. Enhanced Attribute Based Encryption for Cloud Computing

42. Image Encryption Using Elliptic Curve Cryptograhy and Matrix

43. An Optimized Encryption Technique using an Arbitrary Matrix with Probabilistic Encryption

44. A Work in Progress: Context based Encryption Scheme for Internet of Things

45. Anonymous spatial encryption under affine space delegation functionality with full security

46. Design of fast one-pass authenticated and randomized encryption schema using reversible cellular automata

47. An expressive and provably secure Ciphertext-Policy Attribute-Based Encryption

48. Search pattern leakage in searchable encryption: Attacks and new construction

49. A general transformation from KP-ABE to searchable encryption

50. Encryption of multimedia content in partial encryption scheme of DCT transform coefficients using a lightweight stream algorithm

Catalog

Books, media, physical & digital resources