Search

Your search keyword '"Strong key"' showing total 64 results

Search Constraints

Start Over You searched for: Descriptor "Strong key" Remove constraint Descriptor: "Strong key"
64 results on '"Strong key"'

Search Results

2. Efficient and Secure Identity-based Strong Key-Insulated Signature Scheme without Pairings

3. AHKM: An improved class of hash based key management mechanism with combined solution for single hop and multi hop nodes in IoT

4. Key regeneration-free ciphertext-policy attribute-based encryption and its application

5. Using Smartphones to Enable Low-Cost Secure Consumer IoT Devices

6. Generation of Highly Nonlinear and Dynamic AES Substitution-Boxes (S-Boxes) Using Chaos-Based Rotational Matrices

9. Securing content-centric networks with content-based encryption

10. A lightweight Data Sharing Scheme with Resisting Key Abuse in Mobile Edge Computing

11. Image Encryption Based on DNA Substitution and Chaotic Theory

12. Crypto Key Protection Generated from Images and Chaotic Logistic Maps

13. Privacy Protection and User Traceability in Strong Key-Exposure Resilient Auditing for Cloud Storage

14. WITHDRAWN: Key point oriented shape features and SVM classifier for content based image retrieval

15. 2D Cosine-coupling-Logistic and Sine map for image encryption

16. A Medical Image Encryption Algorithm Based on Hermite Chaotic Neural Network

17. Identity-Based Public Auditing Scheme for Cloud Storage with Strong Key-Exposure Resilience

18. Speech encryption based on the synchronization of fractional-order chaotic maps

19. Strong key-insulated secure and energy-aware certificateless authentication scheme for VANETs

20. Strong Key-Exposure Resilient Auditing for Secure Cloud Storage

21. Security analysis of fast inter-LMA domain handover scheme in proxy mobile IPv6 networks

22. Medical image encryption using edge maps

23. Two-Phase Image Encryption Scheme Based on FFCT and Fractals

24. A cognitive key management technique for energy efficiency and scalability in securing the sensor nodes in the IoT environment: CKMT

25. An image encryption algorithm based on the combination of low - dimensional chaos and high - dimensional chaos

26. ECC Based Encryption Algorithm for Lightweight Cryptography

27. Efficient ID-based Key-insulated Multi Signature Scheme without Pairings

28. Energy Efficient Hierarchical Key Management Protocol

29. A New Hybrid Image Encryption Algorithm Based on 2D-CA, FSM-DNA Rule Generator, and FSBI

30. Electronic Medical Information Encryption Using Modified Blowfish Algorithm

31. Achieving Simple, Secure and Efficient Hierarchical Access Control in Cloud Computing

32. Efficient Strong Key Indistinguishable Access Control in Dynamic Hierarchies with Constant Decryption Cost

33. DNA Cryptography and Deep Learning using Genetic Algorithm with NW algorithm for Key Generation

34. Analysis and Implementation of Combined Approach of RSA and ECC Algorithm for Enhanced Data Security

35. An improved certificateless strong key-insulated signature scheme in the standard model

36. An Efficient Provably Secure Password-Based Authenticated Key Agreement

37. LWE-based lossless computational fuzzy extractor for the Internet of Things

38. VTBPEKE: Verifier-based Two-Basis Password Exponential Key Exchange

39. A New Color Image Encryption Scheme Based on Chaos

40. An efficient privacy-preserving authentication scheme with adaptive key evolution in remote health monitoring system

41. How federal agencies can secure their cloud migrations

42. On the Relations Between Security Notions in Hierarchical Key Assignment Schemes for Dynamic Structures

43. Key Indistinguishability versus Strong Key Indistinguishability for Hierarchical Key Assignment Schemes

44. Dual-key-binding cancelable palmprint cryptosystem for palmprint protection and information security

45. Certificateless strong key-insulated signature without random oracles

46. Robust biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem

47. An improved strong key exposure resilient auditing for cloud storage auditing

48. Authenticated key exchange protocol with enhanced freshness properties

50. A Password-Based Key Derivation Algorithm Using the KBRP Method

Catalog

Books, media, physical & digital resources