Search

Your search keyword '"symmetric encryption"' showing total 33 results

Search Constraints

Start Over You searched for: Descriptor "symmetric encryption" Remove constraint Descriptor: "symmetric encryption" Topic business Remove constraint Topic: business
33 results on '"symmetric encryption"'

Search Results

1. Multilevel Identification Friend or Foe of Objects and Analysis of the Applicability of Post-Quantum Cryptographic Algorithms for Information Security

2. A Lightweight Privacy-Preserving Communication Protocol for Heterogeneous IoT Environment

3. On the Security of Symmetric Encryption Against Mass Surveillance

4. SafeCity: Toward Safe and Secured Data Management Design for IoT-Enabled Smart City Planning

5. DESSE: A Dynamic Efficient Forward Searchable Encryption Scheme

6. A Puzzle-Based Data Sharing Approach with Cheating Prevention Using QR Code

7. Algorithm Substitution Attacks: State Reset Detection and Asymmetric Modifications

8. Increasing network reliability by securing SDN communication with QKD

9. MOE: Multiplication Operated Encryption with Trojan Resilience

10. Towards Efficient LPN-Based Symmetric Encryption

11. Perfectly Secure Shannon Cipher Construction Based on the Matrix Power Function

12. Symmetric Key Encryption Based on Rotation-Translation Equation

13. A fundamental flaw in the ++AE authenticated encryption mode

14. Encryption by Heart (EbH)—Using ECG for time-invariant symmetric key generation

15. Practical homomorphic encryption over the integers for secure computation in the cloud

16. Subverting Decryption in AEAD

17. Universal Optimality of Apollonian Cell Encoders

18. A Note on Keys and Keystreams of Chacha20 for Multi-key Channels

19. Real Time MODBUS Transmissions and Cryptography Security Designs and Enhancements of Protocol Sensitive Information

20. Cryptanalysis of chosen symmetric homomorphic schemes

21. Efficient Key Management and Cipher Text Generation Using BCD Coded Parity Bits

22. Security and key management in IoT-based wireless sensor networks: An authentication protocol using symmetric key

23. Integrating Classical Preprocessing into an Optical Encryption Scheme

24. A Secure and Efficient Lightweight Symmetric Encryption Scheme for Transfer of Text Files between Embedded IoT Devices

25. ase-PoW: a proof of ownership mechanism for cloud deduplication in hierarchical environments

26. Attainable Unconditional Security for Shared-Key Cryptosystems

27. Fast hierarchical key management scheme with transitory master key for wireless sensor networks

28. Symmetric Encryption Relying on Chaotic Henon System for Secure Hardware-Friendly Wireless Communication of Implantable Medical Systems

29. Design of a key exchange protocol between SIM card and service provider

30. Two-Round Password-Only Authenticated Key Exchange in the Three-Party Setting

31. Leakage-Resilient Symmetric Encryption via Re-keying

32. A Secure Data Encryption Method by Employing a Feedback Encryption Mechanism and Three-Dimensional Operation

33. A Novel Idea on Multimedia Encryption Using Hybrid Crypto Approach

Catalog

Books, media, physical & digital resources