Search Results - ACM: E.: Data/E.3: DATA ENCRYPTION
-
1
Authors: et al.
Contributors: et al.
Source: EUROCRYPT 2003 ; https://hal.inria.fr/inria-00509191 ; EUROCRYPT 2003, May 2003, Warsaw, Poland. pp.229-249, ⟨10.1007/3-540-39200-9_14⟩ ; http://www.springerlink.de/content/k61v1wgre681gky9/
Subject Terms: ACM: E.: Data/E.3: DATA ENCRYPTION, ACM: E.: Data/E.4: CODING AND INFORMATION THEORY, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT], [MATH.MATH-IT]Mathematics [math]/Information Theory [math.IT]
Relation: inria-00509191; https://hal.inria.fr/inria-00509191; https://hal.inria.fr/inria-00509191/document; https://hal.inria.fr/inria-00509191/file/Augot.pdf
-
2
Authors: et al.
Source: Soft Computing - A Fusion of Foundations, Methodologies & Applications; Nov2024, Vol. 28 Issue 21, p12879-12896, 18p
-
3
Authors:
Source: International Journal of Advanced Computer Science and Applications. 11
Subject Terms: 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology
-
4
Authors: et al.
Contributors: et al.
Source: EUROCRYPT 2012 ; https://inria.hal.science/hal-00864374 ; EUROCRYPT 2012, IACR, Apr 2012, Cambridge, United Kingdom. pp.502-519, ⟨10.1007/978-3-642-29011-4_30⟩ ; http://link.springer.com/chapter/10.1007%2F978-3-642-29011-4_30
Subject Terms: Fully-homomorphic encryption, cryptanalysis, approximate gcd, ACM: E.: Data/E.3: DATA ENCRYPTION/E.3.0: Code breaking, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
Subject Geographic: Cambridge, United Kingdom
-
5
Authors:
Source: AIP Conference Proceedings; 2024, Vol. 3083 Issue 1, p1-5, 5p
Subject Terms: DIGITAL images, CIPHERS, ALGORITHMS, IRIS recognition, DATA encryption, IMAGE encryption
-
6
Authors: et al.
Source: Optical & Quantum Electronics; Jun2021, Vol. 53 Issue 6, p1-26, 26p
Subject Terms: IMAGE encryption, OPTICAL images, IMAGING systems, INFORMATION technology security
-
7
Authors: et al.
Source: ACM Transactions on Database Systems; Apr2010, Vol. 35 Issue 2, p12:1-12:46, 46p, 20 Diagrams, 1 Chart, 2 Graphs
Subject Terms: DATA encryption, SYSTEMS design, COMPUTER security, DATA protection, WORLD Wide Web, TECHNOLOGY
-
8
Authors: Savage, Neil
Source: Communications of the ACM; Jun2016, Vol. 59 Issue 6, p12-14, 3p, 2 Color Photographs
Subject Terms: PUBLIC key cryptography, DATA encryption, ACM A.M. Turing Award, COMPUTER science awards
People: DIFFIE, Whitfield, HELLMAN, Martin E.
-
9
Authors: et al.
Contributors: et al.
Source: WCC 2011 - Workshop on coding and cryptography ; https://hal.inria.fr/inria-00614487 ; WCC 2011 - Workshop on coding and cryptography, Apr 2011, Paris, France. pp.483-492
Subject Terms: Broadcast encryption, subset di erence, recurrence, expected header length, asymptotic analysis, layered subset diff erence, ACM: E.: Data/E.3: DATA ENCRYPTION, ACM: E.: Data/E.4: CODING AND INFORMATION THEORY, ACM: G.: Mathematics of Computing/G.2: DISCRETE MATHEMATICS, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-DM]Computer Science [cs]/Discrete Mathematics [cs.DM], [INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT], [MATH.MATH-IT]Mathematics [math]/Information Theory [math.IT]
Relation: inria-00614487; https://hal.inria.fr/inria-00614487; https://hal.inria.fr/inria-00614487/document; https://hal.inria.fr/inria-00614487/file/80.pdf
-
10
Authors: et al.
Source: Soft Computing - A Fusion of Foundations, Methodologies & Applications; Dec2017, Vol. 21 Issue 24, p7473-7483, 11p
Subject Terms: STATISTICAL learning, DATA encryption, CLOUD computing, MULTIPLICATION, CYCLOTOMIC fields
-
11
Authors: et al.
Source: Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security-WISCS'16
Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative SecuritySubject Terms: 0301 basic medicine, 03 medical and health sciences, Electrical and Electronic Engineering, Information Systems, Human-Computer Interaction, Control and Systems Engineering, 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology
File Description: application/pdf
Access URL: https://air.unimi.it/bitstream/2434/447566/5/bdfgprss-wiscs2016.pdf
https://aisberg.unibg.it/handle/10446/80936
https://dl.acm .org/doi/10.1145/2994539.2994549
https://air.unimi.it/handle/2434/447566
https://dblp.uni-trier.de/db/conf/ccs/wiscs2016.html#BacisVFGPRSS16
https://air.unimi.it/bitstream/2434/447566/5/bdfgprss-wiscs2016.pdf
https://hdl.handle.net/2434/447566
https://doi.org/10.1145/2994539.2994549 -
12
Authors: et al.
Source: Communications of the ACM; Nov92, Vol. 35 Issue 11, p19-111, 5p
Subject Terms: LETTERS to the editor, COMPUTER security, ALGORITHMS, DATA encryption, PUBLIC key cryptography
Geographic Terms: UNITED States
-
13
Source: Communications of the ACM; Sep97 Supplement Membernet, Vol. 40, p2-2, 1p
Subject Terms: NEWSLETTERS, INFORMATION policy, COMPUTERS, DATA encryption laws, GOVERNMENT policy
Geographic Terms: UNITED States
Company/Entity: UNITED States. Congress
-
14
Authors: et al.
Source: ACM Transactions on Sensor Networks; Aug2023, Vol. 19 Issue 3, p1-21, 21p
-
15
Authors:
Source: Communications of the ACM; Nov2012, Vol. 55 Issue 11, p56-64, 9p, 1 Color Photograph, 1 Diagram
-
16
Authors: et al.
Source: Journal of Cryptology; Autumn2011, Vol. 24 Issue 4, p694-719, 26p
Subject Terms: DATA encryption, CRYPTOGRAPHY, COMPUTER security, DATA security, DATA protection, COMPUTER science, COMPUTER networks
-
17
Authors: et al.
Source: ACM Transactions on Multimedia Computing, Communications & Applications; Mar2025, Vol. 21 Issue 3, p1-22, 22p
-
18
Authors:
Source: International Journal of Image & Graphics; Jan2021, Vol. 21 Issue 1, pN.PAG-N.PAG, 26p
-
19
Authors:
Source: ACM Transactions on Multimedia Computing, Communications & Applications; Jul2022, Vol. 18 Issue 3, p1-21, 21p
Subject Terms: IMAGE encryption, DIGITAL images, IMAGE compression, DATA privacy, IMAGE representation
-
20
Secure Sharing and Encryption Control of E-commerce Data Information Based on Blockchain Technology.
Authors: Yongxing You
Source: Journal of Cyber Security & Mobility; 2025, Vol. 14 Issue 4, p1007-1032, 26p
Subject Terms: ELECTRONIC commerce, DATA encryption, BLOCKCHAINS, INFORMATION sharing, CLOUD storage
Nájsť tento článok vo Web of Science
Full Text Finder