Search

Your search keyword '"56-bit encryption"' showing total 672 results

Search Constraints

Start Over You searched for: Descriptor "56-bit encryption" Remove constraint Descriptor: "56-bit encryption" Publisher ieee Remove constraint Publisher: ieee
672 results on '"56-bit encryption"'

Search Results

1. Virtualization of the Encryption Card for Trust Access in Cloud Computing

2. On the Security of a Universal Cryptocomputer: the Chosen Instruction Attack

3. Improving Database Security in Cloud Computing by Fragmentation of Data

4. Hidden-Token Searchable Public-Key Encryption

5. A video encryption service based on cloud computing

6. Java Source Code Protection Based on JNI and AES Algorithm

7. Location hierarchical access control scheme based on attribute encryption

8. A Lightweight Multi-receiver Encryption Scheme with Mutual Authentication

9. Efficient Format-Preserving Encryption Mode for Integer

10. A Transparent Encryption Scheme of Video Data for Android Devices

11. An Efficient CPA-Secure Encryption Scheme with Equality Test

12. Policy Based on Homomorphic Encryption and Retrieval Scheme in Cloud Computing

13. Symmetric Key Encryption With Many Secret Keys

14. Efficient, Verifiable and Privacy Preserving Decentralized Attribute-Based Encryption for Mobile Cloud Computing

15. Emerge: Self-Emerging Data Release Using Cloud Data Storage

16. Advanced Fully Homomorphic Encryption Scheme Over Real Numbers

17. Scalable and Reliable Key Management for Secure Deduplication in Cloud Storage

18. WSN key management scheme based on fully bomomorphic encryption

19. Short CCA-Secure Ciphertext-Policy Attribute-Based Encryption

20. Dodrant-homomorphic encryption for cloud databases using table lookup

21. Method for comparative performance analyze of encryption algorithms used in public key infrastructure for secure transmitting of audio information

22. Privacy-preserving online/offline and outsourced multi-authority attribute-based encryption

23. Database Encryption Using Asymmetric Keys: A Case Study

24. Symmetric encryption algorithm using graph representation

25. FPGA implementation and comparison of AES-GCM and Deoxys authenticated encryption schemes

26. Hierarchy attribute-based encryption scheme to support direct revocation in cloud storage

27. An efficient encryption scheme with verifiable outsourced decryption in mobile cloud computing

28. Fully Homomorphic Encryption for Classification in Machine Learning

29. MarkToLock: An image masking security application via insertion of invisible watermark using steganography and Advanced Encryption Standard (AES) algorithm

30. Accelerated encryption algorithms for secure storage and processing in the cloud

31. An Optimal Fully Homomorphic Encryption Scheme

32. Using symmetric and asymmetric cryptography to secure communication between devices in IoT

33. Randomized pseudo-probabilistic encryption algorithms

34. Non-pairing attribute based encryption scheme based on quadratic residuosity

35. Improving availability and confidentiality of shared data under the multi-cloud environment

36. Energy efficient image encryption algorithm

37. Mixed chaotic maps based encryption for high crypto secrecy

38. Towards lightweight Identity-Based Encryption for the post-quantum-secure Internet of Things

39. Enhancing data security of iOS client by encryption algorithm

40. A simple construction of encryption for a tiny domain message

41. Enhancement CAST block algorithm to encrypt big data

42. Identity-based leveled fully homomorphic encryption over ideal lattices

43. A CPA attack against cryptographic hardware implementation on SASEBO-GII

44. Research on scheme of attribute identity authentication system in broadcasting monitoring system

45. Reversible Chaotic Encryption Techniques For Images

46. Unconditionally secure searchable encryption

47. Encryption algorithm using dual modulus

48. Optimizing the Run Time in Mobile Devices

49. Enhanced RSA Algorithm with Varying Key Sizes for Data Security in Cloud

50. Robust video encryption and decryption using selective encryption

Catalog

Books, media, physical & digital resources