Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
11 |
Material Type: Artigo
|
![]() |
Searchable Encryption over Feature-Rich DataWang, Qian ; He, Meiqi ; Du, Minxin ; Chow, Sherman S. M. ; Lai, Russell W. F. ; Zou, QinIEEE transactions on dependable and secure computing, 2018-05, Vol.15 (3), p.496-510Washington: IEEETexto completo disponível |
12 |
Material Type: Livro
|
![]() |
Identity-Based EncryptionSarkar, Palash ; Chatterjee, SanjitNew York, NY: Springer Science + Business Media 2011Texto completo disponível |
13 |
Material Type: Artigo
|
![]() |
Homomorphic Encryption for Machine Learning in Medicine and BioinformaticsWood, Alexander ; Najarian, Kayvan ; Kahrobaei, DelaramACM computing surveys, 2020-09, Vol.53 (4), p.1-35 [Periódico revisado por pares]Baltimore: ACMTexto completo disponível |
14 |
Material Type: Artigo
|
![]() |
Revocable Identity-Based Broadcast Proxy Re-Encryption for Data Sharing in CloudsGe, Chunpeng ; Liu, Zhe ; Xia, Jinyue ; Fang, LimingIEEE transactions on dependable and secure computing, 2021-05, Vol.18 (3), p.1214-1226Washington: IEEETexto completo disponível |
15 |
Material Type: Artigo
|
![]() |
Achieving Secure and Efficient Dynamic Searchable Symmetric Encryption over Medical Cloud DataLi, Hongwei ; Yang, Yi ; Dai, Yuanshun ; Yu, Shui ; Xiang, YongIEEE transactions on cloud computing, 2020-04, Vol.8 (2), p.484-494 [Periódico revisado por pares]Piscataway: IEEE Computer SocietyTexto completo disponível |
16 |
Material Type: Artigo
|
![]() |
A resource-efficient encryption algorithm for multimedia big dataAljawarneh, Shadi ; Yassein, Muneer Bani ; Talafha, We’am AdelMultimedia tools and applications, 2017-11, Vol.76 (21), p.22703-22724 [Periódico revisado por pares]New York: Springer USTexto completo disponível |
17 |
Material Type: Artigo
|
![]() |
Attribute Based Encryption with Privacy Protection and Accountability for CloudIoTLi, Jiguo ; Zhang, Yichen ; Ning, Jianting ; Huang, Xinyi ; Poh, Geong Sen ; Wang, DebangIEEE transactions on cloud computing, 2022-04, Vol.10 (2), p.762-773 [Periódico revisado por pares]Piscataway: IEEETexto completo disponível |
18 |
Material Type: Ata de Congresso
|
![]() |
Leakage-Abuse Attacks Against Searchable EncryptionCash, David ; Grubbs, Paul ; Perry, Jason ; Ristenpart, ThomasProceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015, p.668-679New York, NY, USA: ACMTexto completo disponível |
19 |
Material Type: Artigo
|
![]() |
A Traceable and Revocable Ciphertext-Policy Attribute-based Encryption Scheme Based on Privacy ProtectionHan, Dezhi ; Pan, Nannan ; Li, Kuan-ChingIEEE transactions on dependable and secure computing, 2022-01, Vol.19 (1), p.316-327Washington: IEEETexto completo disponível |
20 |
Material Type: Artigo
|
![]() |
Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applicationsThakur, Sriti ; Singh, Amit Kumar ; Ghrera, Satya Prakash ; Elhoseny, MohamedMultimedia tools and applications, 2019-02, Vol.78 (3), p.3457-3470 [Periódico revisado por pares]New York: Springer USTexto completo disponível |