Search

Your search keyword '"symmetric encryption"' showing total 30 results

Search Constraints

Start Over You searched for: Descriptor "symmetric encryption" Remove constraint Descriptor: "symmetric encryption" Topic encryption Remove constraint Topic: encryption
30 results on '"symmetric encryption"'

Search Results

1. Reversible Cellular Automata Based Cryptosystem.

2. A Concentrated Energy Consumption Wireless Sensor Network by Symmetric Encryption and Attribute Based Encryption Technique.

3. Evaluation of a Modular Approach to AES Hardware Architecture and Optimization.

6. A Compartive Study Between (AES) and (DES) Algorithms Based on the (SET) Protocol

7. A Compartive Study Between (AES) and (DES) Algorithms Based on the (SET) Protocol.

8. A Novel Symmetric Encryption Algorithm and its Implementation.

9. On the Security of Symmetric Encryption Against Mass Surveillance

10. DESSE: A Dynamic Efficient Forward Searchable Encryption Scheme

11. A Puzzle-Based Data Sharing Approach with Cheating Prevention Using QR Code

12. Increasing network reliability by securing SDN communication with QKD

13. MOE: Multiplication Operated Encryption with Trojan Resilience

14. Towards Efficient LPN-Based Symmetric Encryption

15. DNA Vernam cipher.

16. Perfectly Secure Shannon Cipher Construction Based on the Matrix Power Function

17. Symmetric Key Encryption Based on Rotation-Translation Equation

18. Encryption by Heart (EbH)—Using ECG for time-invariant symmetric key generation

19. Subverting Decryption in AEAD

20. Creating an incremental backup for electronic wallet

21. Universal Optimality of Apollonian Cell Encoders

22. A Secure and Efficient Lightweight Symmetric Encryption Scheme for Transfer of Text Files between Embedded IoT Devices

23. Attainable Unconditional Security for Shared-Key Cryptosystems

24. Fast hierarchical key management scheme with transitory master key for wireless sensor networks

25. Symmetric Encryption Relying on Chaotic Henon System for Secure Hardware-Friendly Wireless Communication of Implantable Medical Systems

26. Design of a key exchange protocol between SIM card and service provider

27. Leakage-Resilient Symmetric Encryption via Re-keying

28. A Secure Data Encryption Method by Employing a Feedback Encryption Mechanism and Three-Dimensional Operation

29. Performance differences in encryption software versus storage devices

30. A Novel Idea on Multimedia Encryption Using Hybrid Crypto Approach

Catalog

Books, media, physical & digital resources