Printer Friendly

Browse Data encryption topic

Methods subtopic

Articles

1-192 out of 192 article(s)
Title Author Type Date Words
Traceable Ciphertet-Policy Attribute-Based Encryption with Constant Decryption. Wang, Guangbo; Li, Feng; Wang, Pengcheng; Hu, Yixiao Report Sep 1, 2021 7428
An ID-based Broadcast Encryption Scheme for Cloud-network Integration in Smart Grid. Niu, Shufen; Fang, Lizhi; Song, Mi; Yu, Fei; Han, Song Report Sep 1, 2021 8105
Fine-Grained and Traceable Key Delegation for Ciphertext-Policy Attribute-Based Encryption. Du, Jiajie; Helll, Nurmamat Report Sep 1, 2021 9787
A Lightweight and Privacy-Preserving Answer Collection Scheme for Mobile Crowdsourcing. Dai, Yingling; Weng, Jian; Yang, Anjia; Yu, Shui; Deng, Robert H. Report Aug 1, 2021 9944
Recoverable Private Key Scheme for Consortium Blockchain Based on Verifiable Secret Sharing. Li, Guojia; You, Lin; Hu, Gengran; Hu, Liqin Report Aug 1, 2021 5922
Efficient Proxy Re-encryption Scheme for E-Voting System. Xiong, Hu Report May 1, 2021 10925
Comparative Analysis of the Effects of Chaotic Systems on the Robustness of Image Encryption. Yildirim, Melih Report May 1, 2021 3256
Novel Secure Hybrid Image Steganography Technique Based on Pattern Matching. Hamza, Ali; Shehzad, Danish; Sarfraz, Muhammad Shahzad; Habib, Usman; Shafi, Numan Report Mar 1, 2021 11511
A Privacy-preserving Data Aggregation Scheme with Efficient Batch Verification in Smart Grid. Zhang, Yueyu; Chen, Jie; Zhou, Hua; Dang, Lanjun Report Feb 1, 2021 7187
Accountable Attribute-based Encryption with Public Auditing and User Revocation in the Personal Health Record System. Zhang, Wei; Wu, Yi; Xiong, Hu; Qin, Zhiguang Report Jan 1, 2021 7753
Sharing and Privacy in PHRs: Efficient Policy Hiding and Update Attribute-based Encryption. Liu, Zhenhua; Ji, Jiaqi; Yin, Fangfang; Wang, Baocang Report Jan 1, 2021 8090
Enhanced Privacy Preservation of Cloud Data by using ElGamal Elliptic Curve (EGEC) Homomorphic Encryption Scheme. vedaraj, M.; Ezhumalai, P. Report Nov 1, 2020 4924
A Comparison on Broadcast Encryption Schemes: A New Broadcast Encryption Scheme. Bodur, Huseyin; Kara, Resul Report Nov 1, 2020 9028
CP-ABE Access Control that Block Access of Withdrawn Users in Dynamic Cloud. Hwang, Yong-Woon; Lee, Im-Yeong Report Oct 1, 2020 8373
Searchable Encrypted String for Query Support on Different Encrypted Data Types. Azizi, Shahrzad; Mohammadpur, Davud Report Oct 1, 2020 6010
Certificateless Proxy Reencryption Scheme (CPRES) Based on Hyperelliptic Curve for Access Control in Content-Centric Network (CCN). Ullah, Zahid; Zeb, Asim; Ullah, Insaf; Awan, Khalid Mahmood; Saeed, Yousaf; Uddin, M. Irfan; Khasawn Report Aug 31, 2020 9180
On the Cryptanalysis of a Bit-Level Image Chaotic Encryption Algorithm. Hu, Yingchun; Yu, Simin; Zhang, Zeqing Report Aug 31, 2020 7027
Multiaccess Edge Computing Empowered Flying Ad Hoc Networks with Secure Deployment Using Identity-Based Generalized Signcryption. Khan, Muhammad Asghar; Ullah, Insaf; Nisar, Shibli; Noor, Fazal; Qureshi, Ijaz Mansoor; Khanzada, Fa Report Jul 31, 2020 9437
Evaluating Encryption Algorithms for Sensitive Data Using Different Storage Devices. Sassani, Bahman A.; Alkorbi, Mohammed; Jamil, Noreen; Naeem, M. Asif; Mirza, Farhaan Report Jun 30, 2020 5134
LWE: An Energy-Efficient Lightweight Encryption Algorithm for Medical Sensors and IoT Devices. Toprak, Sezer; Akbulut, Akhan; Aydin, Muhammed Ali; Zaim, Abdul Haim Report May 2, 2020 5121
A Multilayer Secured Messaging Protocol for REST-based Services. Eteng, Idongesit E.; Olufemi, Oluwaseun O. Report Jul 1, 2019 5475
Adaptively Secure Anonymous Identity-based Broadcast Encryption for Data Access Control in Cloud Storage Service. Chen, Liqing; Li, Jiguo; Zhang, Yichen Report Mar 1, 2019 11957
A Relay-assisted Secure Handover Mechanism for High-speed Trains. Zhao, Yue; Tian, Bo; Chen, Zhouguo; Yang, Jin; Li, Saifei Report Feb 1, 2019 6364
Reversible Data Hiding in Permutation-based Encrypted Images with Strong Privacy. Shiu, Chih-Wei; Chen, Yu-Chi; Hong, Wien Report Feb 1, 2019 7028
Image Encryption with The Cross Diffusion of Two Chaotic Maps. Jiao, Ge; Peng, Xiaojiang; Duan, Kaiwen Report Feb 1, 2019 5512
Higher-Order Masking Scheme against DPA Attack in Practice: McEliece Cryptosystem Based on QD-MDPC Code. Han, Mu; Wang, Yunwen; Ma, Shidian; Wan, Ailan; Liu, Shuai Report Feb 1, 2019 8884
An Improved Fully Homomorphic Encryption Scheme for Cloud Computing. Baharon, Mohd Rizuan; Shi, Qi; Abdollah, Mohd Faizal; Mohamed, S.M.Warusia; Yassin, S.M.M.; Idris, A Report Dec 1, 2018 5948
An Improved Image Scrambling Algorithm Using {[2.sup.n] -1, [2.sup.n], [2.sup.n] +1}. Oyinloye, Damilare Peter; Gbolagade, Kazeem Alagbe Report Oct 1, 2018 3112
RSA Cryptosystem Encryption Based on Three Moduli Set With Common Factor {2n+2, 2n+1,2n}. Kayode, Saheed Y.; Alagbe, Gbolagade K. Report Oct 1, 2018 2154
Improving Security and Privacy-Preserving in Multi-Authorities Ciphertext-Policy Attribute-Based Encryption. Hu, Shengzhou; Li, Jiguo; Zhang, Yichen Report Oct 1, 2018 9193
Encryption and Tokenization-Based System for Credit Card Information Security. Iwasokun, Gabriel Babatunde; Omomule, Taiwo Gabriel; Akinyede, Raphael Olufemi Report Sep 1, 2018 5239
Identity-Based Encryption Technique with Ranking for Multi-Keywords Search in Cloud (IDERMKS). Turkson, Regina Esi; Liao, Yongjian; Baagyere, Edward Yeallakuor Report Sep 1, 2018 9146
The fast image encryption algorithm based on substitution and diffusion. Zhang, Yong; Jia, Xiaoyang Technical report Sep 1, 2018 10251
Video Quality Representation Classification of Encrypted HTTP Adaptive Video Streaming. Dubin, Ran; Hadar, Ofer; Dvir, Amit; Pele, Ofir Technical report Aug 1, 2018 6389
Developing RC4 Algorithm Using S-Box of Advanced Encryption Standard Cipher. Sagheer, Ali M.; Searan, Sura M.; Salih, Salih S. Report Jul 1, 2018 4480
QSDB: An Encrypted Database Model for Privacy-Preserving in Cloud Computing. Liu, Guoxiu; Yang, Geng; Wang, Haiwei; Dai, Hua; Zhou, Qiang Report Jul 1, 2018 7171
Personal Encryption 101: A BEGINNER'S GUIDE TO PROTECTING YOUR MESSAGES, MASKING ONLINE MOVEMENTS, AND STEERING CLEAR OF DIGITAL SNOOPS. Brown, Elizabeth Nolan Jul 1, 2018 2578
Design and Implementation of Secure Stream Cipher Algorithm. Sagheer, Ali M.; Salih, Salih S.; Searan, Sura M. Report May 1, 2018 5012
A Secure Encryption-Based Malware Detection System. Lin, Zhaowen; Xiao, Fei; Sun, Yi; Ma, Yan; Xing, Cong-Cong; Huang, Jun Report Apr 1, 2018 7347
A Coordinated Ciphertext Policy Attribute-based PHR Access Control with User Accountability. Lin, Guofeng; You, Lirong; Hu, Bing; Hong, Hanshu; Sun, Zhixin Report Apr 1, 2018 10313
Fully secure non-monotonic access structure CP-ABE scheme. Yang, Dan; Wang, Baocang; Ban, Xuehua Report Mar 1, 2018 7126
Secure Multicast using Proxy Re-Encryption in an IoT Environment. Kim, SuHyun; Hwang, YongWoon; Seo, JungTaek Report Feb 1, 2018 3895
Security Analysis of the PHOTON Lightweight Cryptosystem in the Wireless Body Area Network. Li, Wei; Liao, Linfeng; Gu, Dawu; Ge, Chenyu; Gao, Zhiyong; Zhou, Zhihong; Guo, Zheng; Liu, Ya; Liu, Report Jan 1, 2018 9123
Fully Homomorphic Encryption Based On the Parallel Computing. Tan, Delin; Wang, Huajun Report Jan 1, 2018 8591
Identity Based Proxy Re-encryption Scheme under LWE. Yin, Wei; Wen, Qiaoyan; Li, Wenmin; Zhang, Hua; Jin, Zheng Ping Report Dec 1, 2017 8330
New Key Generation and Encryption Algorithms for Privacy Preservation in Mobile Ad Hoc Networks. Amiruddin; Ratna, Anak Agung Putri; Sari, Riri Fitri Report Dec 1, 2017 6044
Elevating your encryption practices. Gatka, Josh Column Nov 1, 2017 420
Enhancing AES with Time-Bound and Feedback Artificial Agent Algorithms for Security and Tracking of Multimedia Data on Transition. Isah, A.O.; Alhassan, J.K.; Olanrewaju, S.S.; Aminu, Enesi Femi Report Oct 1, 2017 6156
Preserving Confidentiality and Privacy of Sensitive Data in e-Procurement System. Narang, Rajesh; Narang, Tanmay Report Oct 1, 2017 4568
A Secure and Efficient E-Medical Record System via Searchable Encryption in Public Platform. Xu, Lei; Xu, Chungen; Zhang, Xing Report Sep 1, 2017 7190
A comprehensive cloud security model with enhanced key management, access control and data anonymization features. Mini, G. Venifa; Viji, K.S. Angel Report Aug 1, 2017 6966
Verifiable outsourced ciphertext-policy attribute-based encryption for mobile cloud computing. Zhao, Zhiyuan; Wang, Jianhua Report Jun 1, 2017 9576
An improved cancelable fingerprint template encryption system research. Wang, Feng; Han, Bo; Niu, Lei; Wang, Ya Report Apr 1, 2017 5732
Identity-based signcryption groupkey agreement protocol using bilinear pairing. Reddi, Sivaranjani; Borra, Surekha Report Mar 1, 2017 5253
PPNC: Privacy preserving scheme for random linear network coding in smart grid. He, Shiming; Zeng, Weini; Xie, Kun; Yang, Hongming; Lai, Mingyong; Su, and Xin Report Mar 1, 2017 10192
An efficient chaotic image encryption algorithm based on self-adaptive model and feedback mechanism. Zhang, Xiao; Wang, Chengqi; Zheng, Zhiming Report Mar 1, 2017 6744
Bitwise collision attack based on second-order distance. Wang, Danhui; Wang, An Report Mar 1, 2017 5463
Commutative Watermarking-Encryption of Audio Data with Minimum Knowledge Verification. Schmitz, Roland; Gruber, Jan Report Jan 1, 2017 7843
DWT versus WP Based Optical Color Image Encryption Robust to Composite Attacks. Mohamed, M.A.; Samrah, Ahmed Shaaban; Allah, Mohamed Ismail Fath Report Jan 1, 2017 5502
Image Encryption Algorithm Based on Hyperchaotic Maps and Nucleotide Sequences Database. Niu, Ying; Zhang, Xuncai; Han, Feng Report Jan 1, 2017 4025
Chaotic Image Encryption Algorithm Based on Bit Permutation and Dynamic DNA Encoding. Zhang, Xuncai; Han, Feng; Niu, Ying Report Jan 1, 2017 6623
Batch Image Encryption Using Generated Deep Features Based on Stacked Autoencoder Network. Hu, Fei; Wang, Jingyuan; Xu, Xiaofei; Pu, Changjiu; Peng, Tao Report Jan 1, 2017 4866
Cryptanalysis and Improvement of Chaos-Based Image Encryption Scheme with Circular Inter-Intra-Pixels Bit-Level Permutation. Fan, Haiju; Li, Ming Report Jan 1, 2017 7034
Adaptive Security of Broadcast Encryption, Revisited. Zhu, Bingxin; Wei, Puwen; Wang, Mingqiang Report Jan 1, 2017 10815
New Linear Cryptanalysis of Chinese Commercial Block Cipher Standard SM4. Liu, Yu; Liang, Huicong; Wang, Wei; Wang, Meiqin Report Jan 1, 2017 6522
A Comparative Evaluation of Algorithms in the Implementation of an Ultra-Secure Router-to-Router Key Exchange System. Parmar, Nishaal J.; Verma, Pramode K. Report Jan 1, 2017 5532
Revocable Key-Aggregate Cryptosystem for Data Sharing in Cloud. Gan, Qingqing; Wang, Xiaoming; Wu, Daini Report Jan 1, 2017 8778
CP-ABE Access Control Scheme for Sensitive Data Set Constraint with Hidden Access Policy and Constraint Policy. Helil, Nurmamat; Rahman, Kaysar Report Jan 1, 2017 10616
Verifiable Outsourced Decryption of Attribute-Based Encryption with Constant Ciphertext Length. Li, Jiguo; Sha, Fengjie; Zhang, Yichen; Huang, Xinyi; Shen, Jian Report Jan 1, 2017 7981
Semantically Secure Symmetric Encryption with Error Correction for Distributed Storage. Partala, Juha Report Jan 1, 2017 8595
Dynamic Rule Encryption for Mobile Payment. Husni, Emir Report Jan 1, 2017 6422
A Novel Construction of Substitution Box Involving Coset Diagram and a Bijective Map. Razaq, Abdul; Yousaf, Awais; Shuaib, Umer; Siddiqui, Nasir; Ullah, Atta; Waheed, Adil Report Jan 1, 2017 7976
A Novel Fuzzy Encryption Technique Based on Multiple Right Translated AES Gray S-Boxes and Phase Embedding. Azam, Naveed Ahmed Report Jan 1, 2017 3824
Multiuser Searchable Encryption with Token Freshness Verification. Sharma, Dhruti; Jinwala, Devesh C. Report Jan 1, 2017 12294
A Hybrid Chaotic and Number Theoretic Approach for Securing DICOM Images. Chandrasekaran, Jeyamala; Thiruvengadam, S.J. Report Jan 1, 2017 6120
Protecting Private Data by Honey Encryption. Yin, Wei; Indulska, Jadwiga; Zhou, Hongjian Report Jan 1, 2017 6314
Shorter Decentralized Attribute-Based Encryption via Extended Dual System Groups. Zhang, Jie; Chen, Jie; Ge, Aijun; Ma, Chuangui Report Jan 1, 2017 7542
Two-Phase Image Encryption Scheme Based on FFCT and Fractals. Mikhail, Mervat; Abouelseoud, Yasmine; ElKobrosy, Galal Report Jan 1, 2017 7387
Quantum-to-the-Home: Achieving Gbits/s Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment. Asif, Rameez; Buchanan, William J. Report Jan 1, 2017 5735
An Efficient Secret Key Homomorphic Encryption Used in Image Processing Service. Yang, Pan; Gui, Xiaolin; An, Jian; Tian, Feng Report Jan 1, 2017 7890
Certificateless Key-Insulated Generalized Signcryption Scheme without Bilinear Pairings. Zhou, Caixue; Zhao, Zhiqiang; Zhou, Wan; Mei, Yuan Report Jan 1, 2017 15158
A Chaos-Based Authenticated Cipher with Associated Data. The, Je Sen; Samsudin, Azman Report Jan 1, 2017 10248
Protecting Information with Subcodstanography. Kohler, Mirko; Lukic, Ivica; Cik, Visnja Krizanovic Report Jan 1, 2017 8130
Symmetric Blind Decryption with Perfect Secrecy. Partala, Juha Report Jan 1, 2017 10854
Efficient identity-based generalized ring signcryption scheme. Zhou, Caixue; Cui, Zongmin; Gao, Guangyong Report Dec 1, 2016 10394
Provable secure brand-new multi-auction mechanism with dynamic identity. Lee, Jung-San; Wei, Kuo-Jui; Chen, Ying-Chin; Sun, Yun-Hsiang Report Dec 1, 2016 12126
Efficient top-k join processing over encrypted data in a cloud environment. Kim, Jong Wook Report Oct 1, 2016 8028
Privacy-assured boolean adjacent vertex search over encrypted graph data in cloud computing. Zhu, Hong; Wu, Bin; Xie, Meiyi; Cui, Zongmin Report Oct 1, 2016 8981
A survey of homomorphic encryption for outsourced big data computation. Fun, Tan Soo; Samsudin, Azman Report Aug 1, 2016 13300
Ciphertext-policy attribute-based encryption with hidden access policy and testing. Li, Jiguo; Wang, Haiping; Zhang, Yichen; Shen, Jian Report Jul 1, 2016 6611
Reverse iterative image encryption scheme using 8-layer cellular automata. Zhang, Xing; Zhang, Hong; Xu, Chungen Report Jul 1, 2016 5966
Quantized DCT coefficient category address encryption for JPEG image. Li, Shanshan; Zhang, Yuanyuan Report Apr 1, 2016 6317
Towards efficient sharing of encrypted data in cloud-based mobile social network. Sun, Xin; Yao, Yiyang; Xia, Yingjie; Liu, Xuejiao; Chen, Jian; Wang, Zhiqiang Report Apr 1, 2016 4775
Secured storage for dynamic data in cloud. Ponnuramu, Veeralakshmi; Tamilselvan, Latha Report Mar 1, 2016 6324
A distributed security mechanism for resource-constrained IoT devices. King, James; Awad, Ali Ismail Report Mar 1, 2016 6744
A Fingerprint Image Encryption Scheme Based on Hyperchaotic Rossler Map. Abundiz-Perez, F.; Cruz-Hernandez, C.; Murillo-Escobar, M.A.; Lopez-Gutierrez, R.M.; Arellano-Delgad Report Jan 1, 2016 6227
Privacy-preserving cloud-based personal health record system using attribute-based encryption and anonymous multi-receiver identity-based encryption. Wang, Changji; Xu, Xilei; Shi, Dongyuan; Fang, Jian Report Dec 1, 2015 5016
Efficient anonymous broadcast encryption with adaptive security. Zhou, Fu-Cai; Lin, Mu-Qing; Zhou, Yang; Li, Yu-Xi Report Nov 1, 2015 10405
Design and Analysis of Playfair Ciphers with Different Matrix Sizes. Khan, Salman A. Report Sep 1, 2015 2938
A novel ID-based multi-domain handover protocol for mesh points in WMNs. Zhang, Xue; Li, Guangsong; Han, Wenbao; Ji, Huifang Report Jul 1, 2015 8700
Efficient certificate-based proxy re-encryption scheme for data sharing in public clouds. Lu, Yang Report Jul 1, 2015 10394
Secure data sharing in cloud storage using KAC with certificateless encryption. R., Anitha; V., Pandiyaraju; S., Muthurajkumar; L., Sai Ramesh; R., Rakesh Report Jun 1, 2015 3061
An efficient identity-based deniable authenticated encryption scheme. Wu, Weifeng; Li, Fagen Report May 1, 2015 7453
Enhancing Security and Speed of RC4. Hammood, Maytham M.; Yoshigoe, Kenji; Sagheer, Ali M. Report May 1, 2015 7327
Comparison of serpent, Twofish and Rijndael encryption algorithms in tele-ophthalmology system. Naeemabadi, Mohammadreza; Ordoubadi, Behnam Sadeghi; Dehnavi, Alireza Mehri; Bahaadinbeigy, Kambiz Report Apr 1, 2015 5203
A dynamic study with side channel against an identification based encryption. Aouinatou, Rkia; Belkasmi, Mostafa; Askali, Mohamed Report Apr 1, 2015 11190
A provable one-way authentication key agreement scheme with user anonymity for multi-server environment. Zhu, Hongfeng Report Feb 1, 2015 8368
Double sieve collision attack based on bitwise detection. Ren, Yanting; Wu, Liji; Wang, An Report Jan 1, 2015 4893
Ciphertext diverge-merge scheme of identity-based encryption for cloud-based file transmission service. Sato, Makoto; Mohri, Masami; Doi, Hiroshi; Shiraishi, Yoshiaki Report Jan 1, 2015 4566
Performance efficiency of modified AES algorithm using multiple S-Boxes. Wenceslao, Felicisimo V., Jr. Report Jan 1, 2015 4268
Secure high level communication protocol for CAN bus. Dosek, Roman; Janku, Peter; Bliznak, Michal; Varacha, Pavel Report Jan 1, 2015 3345
Analysing the combined Kerberos timed authentication protocol and frequent key renewal using CSP and rank functions. Kirsal-Ever, Yoney; Eneh, Agozie; Gemikonakli, Orhan; Mostarda, Leonardo Report Dec 1, 2014 8785
Attribute-based data sharing with flexible and direct revocation in cloud computing. Zhang, Yinghui; Chen, Xiaofeng; Li, Jin; Li, Hui; Li, Fenghua Report Nov 1, 2014 11679
Towards cost effective approach for storing intermediate datasets in cloud. Ramachandran, Sumalatha; Chithan, Selvakumar; Ravindran, Siddharth; Divya, K. Report Oct 15, 2014 4314
Design and Implementation of Hiding Techniques to Obfuscate Against Side-Channel Attacks on AES. Andel, Todd R.; Fritzke, Austin; Humphries, Jeffrey W.; McDonald, J. Todd Report May 1, 2014 5327
More companies strive to emulate U.S.-style retention policies. Brief article May 1, 2014 288
Role-balance based multi-secret images sharing using Boolean operations. Chan, Chi-Shiang; Chou, Yung-Chen; Chen, Yi-Hui; Tsai, Yuan-Yu Report May 1, 2014 6459
Research on application of image encryption technology based on chaotic of cellular neural network. Li, Guo-dong; Zhao, Guo-min; Xu, Wen-xia; Yao, Sheng-zhuo Report Apr 1, 2014 2691
Software stream cipher based on pGSSG generator. Tasheva, Antoniya; Tasheva, Zhaneta; Nakov, Ognyan Report Apr 1, 2014 6016
Geometric multiple watermarking scheme for mobile 3D content based on anonymous buyer-seller watermarking protocol. Lee, Suk-Hwan; Kwon, Seong-Geun; Kwon, Ki-Ryong Report Feb 1, 2014 8117
Detecting hidden encrypted volume files via statistical analysis. Piccinelli, Mario; Gubian, Paolo Report Jan 1, 2014 6093
An adaptive steganographic method in frequency domain based on statistical metrics of image. Seyyedi, Seyyed Amin; Ivanov, Nick Report Jan 1, 2014 3374
Efficiency and flexibility of fingerprint scheme using partial encryption and discrete wavelet transform to verify user in cloud computing. Yassin, Ali A. Report Jan 1, 2014 6648
A layered searchable encryption scheme with functional components independent of encryption methods. Luo, Guangchun; Peng, Ningduo; Qin, Ke; Chen, Aiguo Report Jan 1, 2014 13742
A survey of research progress and development tendency of attribute-based encryption. Pang, Liaojun; Yang, Jie; Jiang, Zhengtao Report Jan 1, 2014 11661
An improved piecewise linear chaotic map based image encryption algorithm. Hu, Yuping; Zhu, Congxu; Wang, Zhijian Report Jan 1, 2014 3290
Novel image encryption scheme based on Chebyshev Polynomial and Duffing map. Stoyanov, Borislav; Kordov, Krasimir Report Jan 1, 2014 7613
Chaotic image encryption based on running-key related to plaintext. Guanghui, Cao; Kai, Hu; Yizhi, Zhang; Jun, Zhou; Xing, Zhang Report Jan 1, 2014 4486
Minutiae matching with privacy protection based on the combination of garbled circuit and homomorphic encryption. Li, Mengxing; Feng, Quan; Zhao, Jian; Yang, Mei; Kang, Lijun; Wu, Lili Report Jan 1, 2014 10819
A chaotic cryptosystem for images based on Henon and Arnold cat map. Soleymani, Ali; Nordin, Jan; Sundararajan, Elankovan Report Jan 1, 2014 11499
Separable and error-free reversible data hiding in encrypted image with high payload. Yin, Zhaoxia; Luo, Bin; Hong, Wien Report Jan 1, 2014 4014
A novel chaotic map and an improved chaos-based image encryption scheme. Zhang, Xianhan; Cao, Yang Report Jan 1, 2014 4376
Dual key speech encryption algorithm based underdetermined BSS. Zhao, Huan; He, Shaofang; Chen, Zuo; Zhang, Xixiang Report Jan 1, 2014 4080
Practical electromagnetic disturbance analysis on commercial contactless smartcards. Ji, Jaedeok; Han, Dong-Guk; Jung, Seokwon; Lee, Sangjin; Moon, Jongsub Report Jan 1, 2014 4600
An attribute-based encryption scheme with revocation for fine-grained access control in wireless body area networks. Tian, Ye; Peng, Yanbin; Peng, Xinguang; Li, Hongbin Report Jan 1, 2014 6341
Privacy preserving inner product of vectors in cloud computing. Sheng, Gang; Wen, Tao; Guo, Quan; Yin, Ying Report Jan 1, 2014 3498
An efficient confidentiality and integrity preserving aggregation protocol in wireless sensor networks. Zhu, Liehuang; Yang, Zhen; Xue, Jingfeng; Guo, Cong Report Jan 1, 2014 5782
A function private attribute-based encryption. Han, Fei; Qin, Jing Report Jan 1, 2014 4030
The security weakness of block cipher piccolo against fault analysis. Song, Junghwan; Lee, Kwanhyung; Jung, Younghoon Report Jan 1, 2014 8706
Sharing privacy protected and statistically sound clinical research data using outsourced data storage. Noh, Geontae; Chun, Ji Young; Jeong, Ik Rae Report Jan 1, 2014 10444
An identity-based key-insulated encryption with message linkages for peer-to-peer communication network. Hsu, Chien-Lung; Lin, Han-Yu Report Nov 1, 2013 5991
An efficient somewhat HE scheme over integers and its variation. Yang, Haomiao; Kim, Hyunsung; Tang, Dianhua; Li, Hongwei Report Oct 1, 2013 7663
Bit-projection based color image encryption using a virtual rotated view. Nini, Brahim Report Sep 1, 2013 6977
An image encryption scheme based on concatenated torus automorphisms. Mao, Qian; Chang, Chin-Chen; Wu, Hsiao-Ling Report Jun 1, 2013 9001
Augmented broadcaster identity-based broadcast encryption. Zhang, Jianhong; Xu, Yuwei; Chen, Zhipeng Report Jun 1, 2013 5423
Symmetric searchable encryption with efficient conjunctive keyword search. Jho, Nam-Su; Hong, Dowon Report May 1, 2013 7650
Methods of encryption keys: example of elliptic curve. Abdelhakim, Chillali; Boulagouaz, M'hammed Report Jan 1, 2013 114
Group key agreement from signcryption. Lv, Xixiang; Li, Hui Technical report Dec 1, 2012 6869
Crypto-compression of images based on the ANNs and the AES algorithm. Benlcouiri, Y.; Benabdellah, M.; Ismaili, M.C.; Azizi, A. Report Oct 1, 2012 2771
DNA-based data encryption and hiding using Playfair and insertion techniques. Atito, A.; Khalifa, A.; Rida, S.Z. Report Oct 1, 2012 3592
Secure network communication based on text-to-image encryption. Abusukhon, Ahmad; Talib, Mohamad; Ottoum, Issa Report Oct 1, 2012 3530
Amalgamation of cyclic bit operation in SD-EI image encryption method: an advanced version of SD-EI method: SD-EI ver-2. Dey, Somdip Report Jul 1, 2012 2824
An image encryption method: SD-advanced image encryption standard: SD-AIES. Dey, Somdip Report Apr 1, 2012 3962
SERCID: a secure mechanism for data collection in wireless sensor networks. Mao, Yuxin Report Apr 1, 2012 5772
Short signcryption scheme for the Internet of things. Zhou, Xuanwu; Jin, Zhigang; Fu, Yan; Zhou, Huaiwei; Qin, Lianmin Report Dec 1, 2011 6670
New constructions of identity-based broadcast encryption without random oracles. Zhang, Leyou; Wu, Qing; Hu, Yupu Report Feb 1, 2011 5082
LTSC-128: stream cipher based on the intractable Shortest Vector Problem in Lattice. Suwais, Khaled; Samsudin, Azman Report Feb 1, 2011 5139
A practical and secure buyer-seller watermarking protocol. Hu, Defa; Li, Qiaoliang Report Feb 1, 2011 3953
Encryption scheme for MPEG-4 media transmission exploiting frame dropping. Shin, Dongkyoo; Shin, Dongil; Shin, Jaewan; Kim, Soohan; Kim, Seungdong Report Oct 1, 2010 4596
A proposed algorithm using DNA-based cryptography and steganography techniques. tantawi, Mostafa Reda El; Ali, Amr Mohamed Abd El Shafouk Report Oct 1, 2010 6069
Cracking the code. Brief article Jun 19, 2010 182
It's better to prevent than to cure. Tsybulskaya, Alexandra Apr 1, 2010 801
Secure convertible authenticated encryption scheme based on RSA. Wu, Tzong-Sun; Lin, Han-Yu Report Nov 1, 2009 4203
Encryption is the equivalent of a seat belt for data. Cordial, Andy Oct 1, 2009 1026
Visual security assessment for cipher-images based on neighborhood similarity. Yao, Ye; Xu, Zhengquan; Sun, Jing Report Mar 1, 2009 5139
The generation of a pseudorandom string for the construction of the encryption keys. Dascalescu, Ana; Nidelea, Marinela Report Jan 1, 2009 1802
Two-level key pool design-based random key pre-distribution in wireless sensor networks. Mohaisen, Abedelaziz; Nyang, DaeHun; AbuHmed, Tamer Report Oct 1, 2008 6489
Problem with -52 modifier for US follicle evaluation. Witt, Melanie Brief article May 1, 2008 289
Dx/procedure mismatch when checking for fibroids. Witt, Melanie May 1, 2008 373
BeCrypt selected for additional encryption assurance. Brief article May 1, 2008 119
CPT coding for turbinate procedures. Isenberg, Steven Jan 1, 2008 403
Slow payment for unlisted codes for lap hysterectomy. Witt, Melanie Brief article Oct 1, 2007 212
It's "false labor" if there's no bleeding--at any date. Witt, Melanie Brief article Oct 1, 2007 144
Colporrhaphy? Do not code for posterior repair. Witt, Melanie Brief article Oct 1, 2007 244
Patient asks for test; is that "medical necessity"? Witt, Melanie Brief article Oct 1, 2007 108
Best practices for mobile defense: several encryption methods are available, but training and planning are also important. Brownlow, Jeff; Dale, Jonathan; Lofaso, Nick Sep 1, 2007 1612
Coding blunders. Hill, Emily Sep 1, 2007 699
Best options, techniques, and coding tips for pelvic prolapse repair. Discussion Sep 1, 2007 8351
Bundle codes for repair of a pelvic floor defect? Witt, Melanie Brief article Jun 1, 2007 208
Encryption: we know we need it--so now what? Encrypting backed up data stored to tape or other mobile media. Starr, Matt Jan 1, 2006 1281
Data encryption strategies; Part 2: encrypting high-performance, high-volume storage. Moore, Fred Oct 1, 2005 3609
Data encryption essentials. Sep 1, 2005 1093
Preparing for encryption: new threats, legal requirements boost need for encrypted data. Moore, Fred Aug 1, 2005 1718
Encryption in theory and practice. (Sending Messages Securely). Busta, Bruce Nov 1, 2002 2705
Hidden Writing and National Security. Castelluccio, Michael Brief Article Nov 1, 2001 1063
You've Been Hacked... Now What? NEELEY, DEQUENDRE Feb 1, 2000 2907
How to keep your secret data secret. Corbitt, Terry May 1, 1999 1069
The new guerrilla warfare. Hardy, Stephen M. Sep 1, 1996 4064
Secure networking. Oct 1, 1994 607
Encrypting personal identifiers. Meux, Eleanor Jun 1, 1994 3744
Team sieving cracks a huge number. Peterson, Ivars May 7, 1994 673
Cloak and data. Baum, Ronald J. Mar 1, 1989 901

Terms of use | Privacy policy | Copyright © 2022 Farlex, Inc. | Feedback | For webmasters |