Printer Friendly

Browse Data encryption topic

Analysis subtopic

Articles

1-15 out of 15 article(s)
Title Author Type Date Words
Modified Ciphertext-Policy Attribute-Based Encryption Scheme with Efficient Revocation for PHR System. Zheng, Hongying; Wu, Jieming; Wang, Bo; Chen, Jianyong Report Jan 1, 2017 7398
Multimedia Security Application of a Ten-Term Chaotic System without Equilibrium. Wang, Xiong; Akgul, Akif; Kacar, Sezgin; Pham, Viet-Thanh Report Jan 1, 2017 4305
Finite Precision Logistic Map between Computational Efficiency and Accuracy with Encryption Applications. Sayed, Wafaa S.; Radwan, Ahmed G.; Rezk, Ahmed A.; Fahmy, Hossam A.H. Report Jan 1, 2017 9763
Efficient Solutions to Two-Party and Multiparty Millionaires' Problem. Liu, Xin; Li, Shundong; Chen, XiuBo; Xu, Gang; Zhang, Xiaolin; Zhou, Yong Report Jan 1, 2017 8985
A Novel Image Encryption Algorithm Based on a Fractional-Order Hyperchaotic System and DNA Computing. Li, Taiyong; Yang, Minggao; Wu, Jiang; Jing, Xin Report Jan 1, 2017 7581
A Chaos Robustness Criterion for 2D Piecewise Smooth Map with Applications in Pseudorandom Number Generator and Image Encryption with Avalanche Effect. Han, Dandan; Min, Lequan; Hao, Longjie Report Jan 1, 2016 7486
The importance of trapdoor functions. Lecklider, Tom Jan 1, 2015 1951
Quantum key technology boasts unbreakable encryption. Brief article Oct 1, 2014 240
Collaborating for effective information governance. Witer, Vicki May 1, 2014 503
More companies strive to emulate U.S.-style retention policies. Brief article May 1, 2014 288
Real time related key attack on Hummingbird-2. Zhang, Kai; Ding, Lin; Li, Junzhi; Guan, Jie Report Aug 1, 2012 8406
Breaches spur data encryption. Brief Article Sep 1, 2005 161
Encryption in theory and practice. (Sending Messages Securely). Busta, Bruce Nov 1, 2002 2705
DES is dead. long live DES! Herskovitz, Don Sep 1, 1997 845
Encryption: a primer. Wade, Bob Mar 1, 1993 4201

Terms of use | Privacy policy | Copyright © 2020 Farlex, Inc. | Feedback | For webmasters