Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
11 |
Material Type: Artigo
|
Enhanced Lorenz-Chaotic Encryption Method for Partial Medical Image Encryption and Data Hiding in Big Data HealthcareRashmi, P. ; Supriya, M. C. ; Hua, Qiaozhi Chakraborty, Chinmay ; Chinmay ChakrabortySecurity and communication networks, 2022-02, Vol.2022, p.1-9 [Periódico revisado por pares]London: HindawiTexto completo disponível |
|
12 |
Material Type: Artigo
|
Parallel encryption of input and output data for HPC applicationsLapworth, LeighThe international journal of high performance computing applications, 2022-03, Vol.36 (2), p.231-250 [Periódico revisado por pares]London, England: SAGE PublicationsTexto completo disponível |
|
13 |
Material Type: Artigo
|
Data hiding in encryption–compression domainSingh, O. P. ; Singh, A. K.Complex & intelligent systems, 2023-06, Vol.9 (3), p.2759-2772 [Periódico revisado por pares]Cham: Springer International PublishingTexto completo disponível |
|
14 |
Material Type: Artigo
|
Computer Network Security Management of Data Encryption TechnologySun, Caiping ; Wang, Weijiang Hashmi, Mohammad Farukh ; Mohammad Farukh HashmiWireless communications and mobile computing, 2022-09, Vol.2022, p.1-9 [Periódico revisado por pares]Oxford: HindawiTexto completo disponível |
|
15 |
Material Type: Artigo
|
Memory encryption: A survey of existing techniquesHenson, Michael ; Taylor, StephenACM computing surveys, 2014-04, Vol.46 (4), p.1-26 [Periódico revisado por pares]Baltimore: Association for Computing MachineryTexto completo disponível |
|
16 |
Material Type: Livro
|
PseudorandomnessVadhan, SalilFoundations and trends in theoretical computer science, 2012, Vol.7 (1-3), p.1-336 [Periódico revisado por pares]Hanover, Mass: Now PublishersTexto completo disponível |
|
17 |
Material Type: Livro
|
A decade of lattice cryptographyPeikert, ChrisFoundations and trends in theoretical computer science, 2016, Vol.10 (4), p.283-424 [Periódico revisado por pares]Hanover, Massachusetts: Now PublishersSem texto completo |
|
18 |
Material Type: Artigo
|
Encryption Policies for Regulating Access to Outsourced DataDE CAPITANI DI VIMERCATI, Sabrina ; FORESTI, Sara ; JAJODIA, Sushil ; PARABOSCHI, Stefano ; SAMARATI, PierangelaACM transactions on database systems, 2010-04, Vol.35 (2), p.1-46 [Periódico revisado por pares]New York, NY: Association for Computing MachineryTexto completo disponível |
|
19 |
Material Type: Artigo
|
Image Encryption with Double Spiral Scans and Chaotic MapsYu, Chunqiang ; Xu, Shijie ; Yang, Ye ; Tang, Zhenjun ; Zhang, Xianquan Del Rey, Angel M. ; Angel M Del ReySecurity and communication networks, 2019-01, Vol.2019 (2019), p.1-15 [Periódico revisado por pares]Cairo, Egypt: Hindawi Publishing CorporationTexto completo disponível |
|
20 |
Material Type: Artigo
|
Application Research of Data Encryption Algorithm in Computer Security ManagementGong, Qianru Nagaraj, Balakrishnan ; Balakrishnan NagarajWireless communications and mobile computing, 2022-07, Vol.2022, p.1-7 [Periódico revisado por pares]Oxford: HindawiTexto completo disponível |