The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Encryption with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1976-1978 (18) 1979-1981 (18) 1982-1983 (17) 1984 (26) 1985 (26) 1986-1987 (42) 1988 (20) 1989 (31) 1990 (25) 1991 (25) 1992 (17) 1993 (51) 1994 (65) 1995 (27) 1996 (58) 1997 (89) 1998 (116) 1999 (148) 2000 (187) 2001 (229) 2002 (289) 2003 (357) 2004 (500) 2005 (677) 2006 (689) 2007 (725) 2008 (751) 2009 (671) 2010 (530) 2011 (572) 2012 (633) 2013 (733) 2014 (776) 2015 (941) 2016 (1073) 2017 (1169) 2018 (1276) 2019 (1398) 2020 (1460) 2021 (1482) 2022 (1544) 2023 (1748) 2024 (510)
Publication types (Num. hits)
article(10762) book(19) data(2) incollection(152) inproceedings(10612) phdthesis(167) proceedings(25)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 5495 occurrences of 1765 keywords

Results
Found 21739 publication records. Showing 21739 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
30Nam-Su Jho, Eun Sun Yoo, Jung Hee Cheon, Myung-Hwan Kim New broadcast encryption scheme using tree-based circle. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2005 DBLP  DOI  BibTeX  RDF punctured interval, broadcast encryption, tree structure, cascade
30Yuliang Zheng 0001, Yongge Wang Efficient and provably secure ciphers for storage device block level encryption. Search on Bibsonomy StorageSS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF storage device encryption, hash function, symmetric cipher
30Eric Corndorf, Chuang Liang, Gregory S. Kanter, Prem Kumar, Horace P. Yuen Quantum-noise: protected data encryption for WDM fiber-optic networks. Search on Bibsonomy Comput. Commun. Rev. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF quantum cryptography, data encryption
30Joseph K. Liu, Victor K. Wei, Duncan S. Wong Custodian-Hiding Verifiable Encryption. Search on Bibsonomy WISA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Publicly Verifiable, Anonymity, Verifiable Encryption
30Palash Sarkar 0001 HEAD: Hybrid Encryption with Delegated Decryption Capability. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF DHIES, delegated decryption, public key encryption
30Kenneth G. Paterson, Arnold K. L. Yau Padding Oracle Attacks on the ISO CBC Mode Encryption Standard. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF padding oracle attack, CBC-mode encryption, ISO standard
30Kaoru Kurosawa, Yvo Desmedt A New Paradigm of Hybrid Encryption Scheme. Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF KEM, standard model, hybrid encryption
30Omer Horvitz, Virgil D. Gligor Weak Key Authenticity and the Computational Completeness of Formal Encryption. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Weak Key Authenticity, Authentication, Cryptography, Encryption, Completeness, Formal Reasoning
30Davor Runje, Mario Kovac Universal Strong Encryption FPGA Core Implementation. Search on Bibsonomy DATE The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Chip Architecture, FPGA, Encryption, IDEA
30Paul C. van Oorschot, Michael J. Wiener A Known Plaintext Attack on Two-Key Triple Encryption. Search on Bibsonomy EUROCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF Triple encryption, cryptanalysis, DES
30Nuttapong Attrapadung, Hideki Imai Conjunctive Broadcast and Attribute-Based Encryption. Search on Bibsonomy Pairing The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Key policy, Revocable ABE, Disjunctive multi-authority ABE, Broadcast encryption, Attribute-based encryption, Ciphertext policy
30David Galindo Breaking and Repairing Damgård et al. Public Key Encryption Scheme with Non-interactive Opening. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF non-interactive proofs, standard model, public key encryption, identity-based encryption
30Cameron Laird Taking a Hard-Line Approach to Encryption. Search on Bibsonomy Computer The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Encryption-enabled hard drives, information security, Data encryption
30Sherman S. M. Chow Token-Controlled Public Key Encryption in the Standard Model. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Token-controlled, provable security, standard model, public key encryption, timed-release encryption
30Yinxia Sun, Futai Zhang, Joonsang Baek Strongly Secure Certificateless Public Key Encryption Without Pairing. Search on Bibsonomy CANS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF certificateless public key encryption, public key encryption, Computational Diffie-Hellman problem
30Reza Curtmola, Juan A. Garay, Seny Kamara, Rafail Ostrovsky Searchable symmetric encryption: improved definitions and efficient constructions. Search on Bibsonomy CCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF searchable symmetric encryption, security definitions, multi-user, searchable encryption
28Yuichi Komano, Kazuo Ohta Efficient Universal Padding Techniques for Multiplicative Trapdoor One-Way Permutation. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
28Tatsuaki Okamoto, David Pointcheval REACT: Rapid Enhanced-Security Asymmetric Cryptosystem Transform. Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
28Adam J. Elbirt, Christof Paar An FPGA implementation and performance evaluation of the Serpent block cipher. Search on Bibsonomy FPGA The full citation details ... 2000 DBLP  DOI  BibTeX  RDF algorithm-agility, FPGA, cryptography, VHDL, block cipher
28Michael Walker 0001 On the Security of 3GPP Networks. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
28Zhenyu Hu, JianChun Jiang, Fuchun Sun 0001 Using IND-CVA for constructing secure communication. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF integrity, authenticated encryption, semantic security, universally composable security, secure channel
28Bian Yang, Christoph Busch 0001, Mohammad Omar Derawi, Patrick Bours, Davrondzhon Gafurov Geometric-Aligned Cancelable Fingerprint Templates. Search on Bibsonomy ICIAP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cancelable fingerprint template, fingerprint alignment, coordinate encryption, template protection
28Heng-Sheng Chen, Tsang-Yean Lee, Huey-Ming Lee Collect and broadcast news in security. Search on Bibsonomy ICIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cipher text, plaintext, algorithm, encryption, decryption
28Kathryn Garson, Carlisle Adams Security and privacy system architecture for an e-hospital environment. Search on Bibsonomy IDtrust The full citation details ... 2008 DBLP  DOI  BibTeX  RDF policy-based encryption, privacy, authentication, health care
28Peng Wang 0009, Dengguo Feng, Wenling Wu Symmetric Nonce Respecting Security Model and the MEM Mode of Operation. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF nonce-based encryption, security model, modes of operation, Blockcipher, tweakable blockcipher
28Manuel Barbosa, Pooya Farshim Secure Cryptographic Workflow in the Standard Model. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Cryptographic Workflow, Key Encapsulation, Secret Sharing, Identity-Based Encryption
28Jin Li 0002, Fangguo Zhang, Yanming Wang A New Hierarchical ID-Based Cryptosystem and CCA-Secure PKE. Search on Bibsonomy EUC Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Public key encryption, Identity based, Bilinear groups
28Erkay Savas, Berk Sunar A Practical and Secure Communication Protocol in the Bounded Storage Model. Search on Bibsonomy ICN (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF hyper-encryption, information theoretical security, pervasive networks, Bounded storage model
28Tomas Sander, Adam L. Young, Moti Yung Non-Interactive CryptoComputing For NC1. Search on Bibsonomy FOCS The full citation details ... 1999 DBLP  DOI  BibTeX  RDF cryptocomputing, cryptography, public key, complexity theory, homomorphic encryption, secure computation
28David Pointcheval New Public Key Cryptosystems Based on the Dependent-RSA Problems. Search on Bibsonomy EUROCRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF the Dependent-RSA Problem, Public-Key Encryption, Semantic Security, Chosen-Ciphertext Attacks
28Oded Goldreich 0001, Shafi Goldwasser, Shai Halevi Eliminating Decryption Errors in the Ajtai-Dwork Cryptosystem. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Public-key Encryption Schemes, Computational Problems in Lattices
28Benoît Chevallier-Mames, Marc Joye Chosen-Ciphertext Secure RSA-Type Cryptosystems. Search on Bibsonomy ProvSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF RSA-based encryption schemes, instance-independence assumptions, one-time mappable chameleon hashing, standard model, public-key encryption, Chosen-ciphertext security
28Takahiro Matsuda 0002, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF IND-CCA security, encapsulation, public key encryption, identity-based encryption, pseudorandom generator
28Ming-Haw Jing, Jian-Hong Chen, Zih-Heng Chen, Yaotsu Chang The Secure DAES Design for Embedded System Application. Search on Bibsonomy EUC Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF branch number, repeating property, symmetric encryption algorithms, embedded system, Advanced Encryption Standard, data security
28Kristian Gjøsteen Symmetric Subgroup Membership Problems. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF subgroup membership problem, standard model, public key encryption, hybrid encryption
28Seungjoo Kim, Jung Hee Cheon, Marc Joye, Seongan Lim, Masahiro Mambo, Dongho Won, Yuliang Zheng 0001 Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation). Search on Bibsonomy IMACC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF ciphertext validity, OAEP-RSA, Encryption, provable security, chosen-ciphertext security, ElGamal encryption
28Stephen R. Dussé, Burton S. Kaliski Jr. A Cryptographic Library for the Motorola DSP56000. Search on Bibsonomy EUROCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF Encryption hardware, Message digest, Montgomery reduction, Motorola DSP56000, RSA, Data Encryption Standard (DES), Modular arithmetic, Multiple-precision arithmetic
27Denis Osin, Vladimir Shpilrain Public Key Encryption and Encryption Emulation Attacks. Search on Bibsonomy CSR The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Debrup Chakraborty, Palash Sarkar 0001 A New Mode of Encryption Providing a Tweakable Strong Pseudo-random Permutation. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF tweakable encryption, strong pseudo-random permutation, mode of operation
27Niels Ferguson, Doug Whiting, Bruce Schneier, John Kelsey, Stefan Lucks, Tadayoshi Kohno Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive. Search on Bibsonomy FSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF authentication, Stream cipher, encryption, MAC
25Vijay Nagarajan, Rajiv Gupta 0001, Arvind Krishnaswamy Compiler-Assisted Memory Encryption for Embedded Processors. Search on Bibsonomy Trans. High Perform. Embed. Archit. Compil. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
25Jirí Giesl, Ladislav Behal, Karel K. Vlcek Hardware solution of chaos based image encryption. Search on Bibsonomy DDECS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
25Mihir Bellare, Zvika Brakerski, Moni Naor, Thomas Ristenpart, Gil Segev 0001, Hovav Shacham, Scott Yilek Hedged Public-Key Encryption: How to Protect against Bad Randomness. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
25Mihir Bellare, Dennis Hofheinz, Scott Yilek Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
25Giuseppe Ateniese, Karyn Benson, Susan Hohenberger Key-Private Proxy Re-encryption. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
25Karl Martin, Konstantinos N. Plataniotis Coding and encryption of visual objects for privacy protected surveillance. Search on Bibsonomy ICIP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
25Yang Lu 0001, Jiguo Li 0001, Junmo Xiao Applying the Fujisaki-Okamoto Conversion to Certificate-based Encryption. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
25Manoj Prabhakaran 0001, Mike Rosulek Homomorphic Encryption with CCA Security. Search on Bibsonomy ICALP (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
25Yohei Hori, Akashi Satoh, Hirofumi Sakane, Kenji Toda Bitstream encryption and authentication with AES-GCM in dynamically reconfigurable systems. Search on Bibsonomy FPL The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
25Yang Lu 0001, Jiguo Li 0001, Junmo Xiao Generic Construction of Certificate-Based Encryption. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
25Zhao Song 0005, Hengjian Li, Yan Xu A Secure and Efficient Fingerprint Images Encryption Scheme. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
25Kazumasa Omote, Kazuhiko Kato Protection and Recovery of Disk Encryption Key Using Smart Cards. Search on Bibsonomy ITNG The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
25Chigullapally Narsimha Raju, Ganugula Umadevi, Kannan Srinathan, C. V. Jawahar Fast and Secure Real-Time Video Encryption. Search on Bibsonomy ICVGIP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
25Jonathan Katz, Amit Sahai, Brent Waters Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
25Ayoub Massoudi, Frédéric Lefèbvre, Christophe De Vleeschouwer, François-Olivier Devaux Secure and Low Cost Selective Encryption for JPEG2000. Search on Bibsonomy ISM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
25Yanli Ren, Dawu Gu Secure Hierarchical Identity Based Encryption Scheme in the Standard Model. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
25Chien-Pen Chuang, Tin-Ying Huang, Li-Chi Yeh Encryption and Decryption with Space Transformation for Bi-directional Association. Search on Bibsonomy EUC (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
25Yvo Desmedt, Duong Hieu Phan A CCA Secure Hybrid Damgård's ElGamal Encryption. Search on Bibsonomy ProvSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
25Dan Boneh, Shai Halevi, Michael Hamburg, Rafail Ostrovsky Circular-Secure Encryption from Decision Diffie-Hellman. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
25Saeed Sedghi, Jeroen Doumen, Pieter H. Hartel, Willem Jonker Towards an Information Theoretic Analysis of Searchable Encryption. Search on Bibsonomy ICICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
25Zhenchuan Chai, Zhenfu Cao, Yuan Zhou Efficient ID-Based Multi-Decrypter Encryption with Short Ciphertexts. Search on Bibsonomy J. Comput. Sci. Technol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF multi-user cryptography, proven security, random oracle, ID-based cryptography
25Ran Canetti, Shai Halevi, Jonathan Katz A Forward-Secure Public-Key Encryption Scheme. Search on Bibsonomy J. Cryptol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
25Shujun Li, Guanrong Chen, Albert Cheung, Bharat K. Bhargava, Kwok-Tung Lo On the Design of Perceptual MPEG-Video Encryption Algorithms. Search on Bibsonomy IEEE Trans. Circuits Syst. Video Technol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
25Mihir Bellare, Alexandra Boldyreva, Kaoru Kurosawa, Jessica Staddon Multirecipient Encryption Schemes: How to Save on Bandwidth and Computation Without Sacrificing Security. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
25Zhaohui Cheng, Liqun Chen 0002, Li Ling, Richard Comley General and Efficient Certificateless Public Key Encryption Constructions. Search on Bibsonomy Pairing The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
25Cécile Delerablée, Pascal Paillier, David Pointcheval Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys. Search on Bibsonomy Pairing The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
25Youngjun Kim, Jason Kim 0004 U-City User Authentication Methods and Encryption Techniques Based on Biometric Technology. Search on Bibsonomy FBIT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
25Gale D. Fritsche, Sara K. Rodgers Encryption technologies: testing and identifying campus needs. Search on Bibsonomy SIGUCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF breach, mandate, privacy, evaluation, protection, compliance, sensitive data
25Ji-Seon Lee, Jik Hyun Chang Semantically Secure Authenticated Encryption Scheme and the Same Scheme for Ad-hoc Group Called a Ring. Search on Bibsonomy ITNG The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
25Michael O. Rabin DISC 20th Anniversary: Invited Talk Provably Unbreakable Hyper-Encryption Using Distributed Systems. Search on Bibsonomy DISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
25Chong Fu, Zhen-chuan Zhang, Ying Chen, Xingwei Wang 0001 An Improved Chaos-Based Image Encryption Scheme. Search on Bibsonomy International Conference on Computational Science (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
25Petre Anghelescu, Silviu Ionita, Emil Sofron Block Encryption Using Hybrid Additive Cellular Automata. Search on Bibsonomy HIS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
25Dalia Khader Public Key Encryption with Keyword Search Based on K-Resilient IBE. Search on Bibsonomy ICCSA (3) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
25Mihir Bellare, Alexandra Boldyreva, Adam O'Neill Deterministic and Efficiently Searchable Encryption. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
25Manoj Prabhakaran 0001, Mike Rosulek Rerandomizable RCCA Encryption. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
25Vijay Nagarajan, Rajiv Gupta 0001, Arvind Krishnaswamy Compiler-Assisted Memory Encryption for Embedded Processors. Search on Bibsonomy HiPEAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
25Yinian Mao, Min Wu 0001 A Joint Signal Processing and Cryptographic Approach to Multimedia Encryption. Search on Bibsonomy IEEE Trans. Image Process. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
25Panu Hämäläinen, Timo Alho, Marko Hännikäinen, Timo D. Hämäläinen Design and Implementation of Low-Area and Low-Power AES Encryption Hardware Core. Search on Bibsonomy DSD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
25François-Xavier Standaert, Gilles Piret, Neil Gershenfeld, Jean-Jacques Quisquater SEA: A Scalable Encryption Algorithm for Small Embedded Applications. Search on Bibsonomy CARDIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
25Daniele Micciancio, Saurabh Panjwani Corrupting One vs. Corrupting Many: The Case of Broadcast and Multicast Encryption. Search on Bibsonomy ICALP (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
25Yi Xin, Ran Tao 0003, Yue Wang 0001 Image Encryption Based on a Novel Reality-Preserving. Search on Bibsonomy ICICIC (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
25Gang Chen 0001, Ke Chen 0005, Jinxiang Dong A Database Encryption Scheme for Enhanced Security and Easy Sharing. Search on Bibsonomy CSCWD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
25Fengling Han, Jiankun Hu, Xinghuo Yu 0001 A Biometric Encryption Approach Incorporating Fingerprint Indexing in Key Generation. Search on Bibsonomy ICIC (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
25Ulrich Kühn 0001 Analysis of a Database and Index Encryption Scheme - Problems and Fixes. Search on Bibsonomy Secure Data Management The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
25Benoît Chevallier-Mames, Pascal Paillier, David Pointcheval Encoding-Free ElGamal Encryption Without Random Oracles. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
25Rong-Jian Chen, Yi-Te Lai, Jui-Lin Lai Architecture design and VLSI hardware implementation of image encryption/decryption system using re-configurable 2D Von Neumann cellular automata. Search on Bibsonomy ISCAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
25Ling Dong, Kefei Chen A Practical Clumped-Tree Multicast Encryption Scheme. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
25Dalia Khader Public Key Encryption with Keyword Search Based on K-Resilient IBE. Search on Bibsonomy ICCSA (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
25Martin Stanek, Lubica Staneková Unpuzzling Puzzle (analysis of a video encryption algorithm). Search on Bibsonomy AINA (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
25Han Yu, Xiamu Niu, Duohe Ma, Changxiang Shen Research on Applying Java Card to Database Encryption Systems. Search on Bibsonomy IIH-MSP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
25James F. Ryan, Blair L. Reid Usable Encryption Enabled by AJAX. Search on Bibsonomy ICNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
25Chao-Shen Chen, Rong-Jian Chen Image Encryption and Decryption Using SCAN Methodology. Search on Bibsonomy PDCAT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
25Amir Said Measuring the strength of partial encryption schemes. Search on Bibsonomy ICIP (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
25Guido Appenzeller Identity-based encryption from algorithm to enterprise deployment. Search on Bibsonomy CCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
25Adam L. Young, Moti Yung Questionable Encryption and Its Applications. Search on Bibsonomy Mycrypt The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
25Yevgeniy Dodis, Adam D. Smith Entropic Security and the Encryption of High Entropy Messages. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
25Shakith Fernando, Yajun Ha Design of Networked Reconfigurable Encryption Engine. Search on Bibsonomy FCCM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
25T. S. B. Sudarshan, Rahil Mir, S. Vijayalakshmi DRIL- A Flexible Architecture for Blowfish Encryption Using Dynamic Reconfiguration, Replication, Inner-Loop Pipelining, Loop Folding Techniques. Search on Bibsonomy Asia-Pacific Computer Systems Architecture Conference The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Blowfish, inner loop pipeline, loop folding, four - tier architecture, Platform independent architecture, DRIL Architecture, replication, Dynamic reconfiguration
25Mamun Bin Ibne Reaz, Faisal Mohd-Yasin, S. L. Tan, H. Y. Tan, Muhammad I. Ibrahimy Partial encryption of compressed images employing FPGA. Search on Bibsonomy ISCAS (3) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
Displaying result #301 - #400 of 21739 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license