Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
15 | Songtao E, Bin Yu 0003, Yicai Huang |
Synchronous Decryption Scheme for Real-time Voice Encrypted Communication Based on Frame ID. |
ICCCS |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Tomás Rabas, Jirí Bucek, Róbert Lórencz |
Single-Trace Attack on NTRU Decryption with Machine Learning and Template Profiling. |
DSD |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Cosimo Anglano, Massimo Canonico, Andrea Cepollina, Davide Freggiaro, Alderico Gallo, Marco Guazzone |
Enabling the forensic study of application-level encrypted data in Android via a Frida-based decryption framework. |
ARES |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Jan Willemson |
Creating a Decryption Proof Verifier for the Estonian Internet Voting System. |
ARES |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Amit Kumar Bishnoi, Bhuvana J |
Carrying out Encryption and Decryption in a Multi-Tenant Cloud Environment. |
IC3I |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Xinyan Wang, Jing Zhang, Zhaotai Meng, Bin Yi, An Hu, Ming Gu |
Research on symmetric encryption and decryption of multi-user shared data for cloud storage environment. |
ICISCAE |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Jing Zhang, Xinyan Wang, Boyu Liu, Junyi Wang, Xiaoqin Li, Liang He |
Research on symmetric encryption and decryption algorithm of shared data based on chaotic mapping and permutation. |
ICISCAE |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Shohei Hiruta, Itaru Hosomi, Hirokazu Hasegawa, Hiroki Takakura |
Security Operation Support by Estimating Cyber Attacks Without Traffic Decryption. |
COMPSAC |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Somchart Fugkeaw |
Implementing An Outsourced Dual-Proxy Signing and Decryption Scheme in Mobile Cloud Computing. |
IPDPS Workshops |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Somchart Fugkeaw, Leon Wirz, Lyhour Hak |
An Efficient Medical Records Access Control with Auditable Outsourced Encryption and Decryption. |
KST |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Po-I Lee, Chih-Hung Wang, Wei-Chun Hsiao |
Implementation and Analysis on Efficient Proxy-based Multicast Secure Data Sharing Mechanism with CP-ABE Supporting Outsourcing Decryption in IoT Environment. |
ICIT |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Yu Lu, Hao Pan 0003, Feitong Tan, Yi-Chao Chen 0001, Jiadi Yu, Jinghai He, Guangtao Xue |
Effectively Learning Moiré QR Code Decryption from Simulated Data. |
INFOCOM |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Xinyuan Qiao, Suwen Song, Jing Tian 0004, Zhongfeng Wang 0001 |
Efficient Decryption Architecture for Classic McEliece. |
ISQED |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Yun Fu, Jingyi Fu, Jinxin Wei |
Encryption and Decryption Using Deep Neural Network. |
MLIS |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Khashayar Barooti, Daniel Collins 0001, Simone Colombo 0002, Loïs Huguenin-Dumittan, Serge Vaudenay |
On Active Attack Detection in Messaging with Immediate Decryption. |
CRYPTO (4) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Tianrui Wang, Anyu Wang 0001, Xiaoyun Wang |
Exploring Decryption Failures of BIKE: New Class of Weak Keys and Key Recovery Attacks. |
CRYPTO (3) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Yang Li, Qingyang Zhang, Jun Cheng, Yiyuan Zhou, Jie Cui 0004, Hong Zhong 0001 |
Attribute-based Verifiable Outsourcing Decryption Encryption Scheme in IIoT. |
NaNA |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Alexander Nilsson |
Decryption Failure Attacks on Post-Quantum Cryptography. (PDF / PS) |
|
2023 |
RDF |
|
15 | Yange Chen, Qingqing Zhao, Pu Duan, Benyu Zhang, Zhiyong Hong, Baocang Wang |
Verifiable privacy-preserving association rule mining using distributed decryption mechanism on the cloud. |
Expert Syst. Appl. |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Josef Kokes, Jonatan Matejka, Róbert Lórencz |
Automatic Detection and Decryption of AES Using Dynamic Analysis. |
SN Comput. Sci. |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Huthaifa A. Al Issa, Mustafa Hamzeh Al-Jarah, Ammar Almomani, Ahmad Al Nawasrah |
Encryption and Decryption Cloud Computing Data Based on XOR and Genetic Algorithm. |
Int. J. Cloud Appl. Comput. |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Sajjad Palanki, Alireza Shafieinejad |
Attribute-Based Encryption with Efficient Attribute Revocation, Decryption Outsourcing, and Multi-Keyword Searching in Cloud Storage. |
ISC Int. J. Inf. Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Maria Perepechaenko, Randy Kuang |
Quantum Encryption and Decryption in IBMQ Systems using Quantum Permutation Pad. |
J. Commun. |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Ying He 0006, Haiyan Wang 0009, Yuan Li, Ke Huang, Victor C. M. Leung, F. Richard Yu, Zhong Ming 0001 |
An Efficient Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Collaborative Decryption With Blockchain. |
IEEE Internet Things J. |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Changhee Hahn, Jongkil Kim |
Verifiable Outsourced Decryption of Encrypted Data From Heterogeneous Trust Networks. |
IEEE Internet Things J. |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Dayane Reis, Haoran Geng, Michael T. Niemier, Xiaobo Sharon Hu |
IMCRYPTO: An In-Memory Computing Fabric for AES Encryption and Decryption. |
IEEE Trans. Very Large Scale Integr. Syst. |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Dongdong Xu 0002, Xiang Wang 0006, Yuanchao Hao, Zhun Zhang, Qiang Hao, Zhiyu Zhou |
A More Accurate and Robust Binary Ring-LWE Decryption Scheme and Its Hardware Implementation for IoT Devices. |
IEEE Trans. Very Large Scale Integr. Syst. |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Haibo Yi |
Fast asymmetric encryption and decryption of SimpleMatrix scheme for Internet of Things. |
Comput. Commun. |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Jiangyu Fu, Zhihua Gan, Xiuli Chai, Yang Lu 0013 |
Cloud-decryption-assisted image compression and encryption based on compressed sensing. |
Multim. Tools Appl. |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Vinod Kumar 0005, Vinay Pathak, Neelendra Badal, Purnendu Shekhar Pandey, Rajesh Mishra, Sachin Kumar Gupta |
Complex entropy based encryption and decryption technique for securing medical images. |
Multim. Tools Appl. |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Chen Gao, Zidong Wang, Xiao He 0001, Hongli Dong |
Fault-Tolerant Consensus Control for Multiagent Systems: An Encryption-Decryption Scheme. |
IEEE Trans. Autom. Control. |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Chih-Min Lin, Duc-Hung Pham, Tuan-Tu Huynh |
Encryption and Decryption of Audio Signal and Image Secure Communications Using Chaotic System Synchronization Control by TSK Fuzzy Brain Emotional Learning Controllers. |
IEEE Trans. Cybern. |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Ningyu Chen, Jiguo Li 0001, Yichen Zhang 0003, Yuyan Guo |
Efficient CP-ABE Scheme With Shared Decryption in Cloud Storage. |
IEEE Trans. Computers |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Bilal S. A. Alhayani, Nagham Hamid, Firas Husham Almukhtar, Omar A. Alkawak, Hemant B. Mahajan, Ameer Sardar Kwekha Rashid, Haci Ilhan, Haydar Abdulameer Marhoon, Husam Jasim Mohammed, Ibrahim Zeghaiton Chaloob, Ahmed Alkhayyat |
Optimized video internet of things using elliptic curve cryptography based encryption and decryption. |
Comput. Electr. Eng. |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Seyedeh Bahareh Zakaria, Keivan Navi |
Image encryption and decryption using exclusive-OR based on ternary value logic. |
Comput. Electr. Eng. |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Ke Gu 0002, Wenbin Zhang, Xiong Li 0002, Weijia Jia 0001 |
Self-Verifiable Attribute-Based Keyword Search Scheme for Distributed Data Storage in Fog Computing With Fast Decryption. |
IEEE Trans. Netw. Serv. Manag. |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Chengjian Liu, Yiwei Zhang, Jiajun Xu, Jian Zhao 0025, Shaohua Xiang |
Ensuring the Security and Performance of IoT Communication by Improving Encryption and Decryption With the Lightweight Cipher uBlock. |
IEEE Syst. J. |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Kasturi Dhal, Satyananda Champati Rai, Prasant Kumar Pattnaik 0001 |
LIKC: A liberty of encryption and decryption through imploration from K-cloud servers. |
J. King Saud Univ. Comput. Inf. Sci. |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Noor Sattar Noor, Dalal Abdulmohsin Hammood, Ali Al-Naji, Javaan S. Chahl |
A Fast Text-to-Image Encryption-Decryption Algorithm for Secure Network Communication. |
Comput. |
2022 |
DBLP DOI BibTeX RDF |
|
15 | M. N. Sharada Guptha, M. N. Eshwarappa |
RL-BLED: A Reversible Logic Design of Bit Level Encryption/Decryption Algorithm for Secure Mammogram Data Transmission. |
Wirel. Pers. Commun. |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Anusha Padmavathi Rajendran, Dhanalakshmi Krishnan Sadhasivam |
An Advanced Encryption Standard in Memory (AESIM) Efficient, High Performance S-box Based AES Encryption and Decryption Architecture on VLSI. |
Wirel. Pers. Commun. |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Abubaker Wahaballa, Zhiguang Qin, Hisham Abdalla, Majdi Abdellatief, Mohamed Ahmed Elfaki |
Oblivious transfer with hidden access control and outsourced decryption from deterministic finite automata-based functional encryption for an in-vehicle sensor database system. |
Trans. Emerg. Telecommun. Technol. |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Yang Zhao, Xing Zhang, Xin Xie, Yi Ding, Sachin Kumar 0002 |
A verifiable hidden policy CP-ABE with decryption testing scheme and its application in VANET. |
Trans. Emerg. Telecommun. Technol. |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Kathrin Hövelmanns, Andreas Hülsing, Christian Majenz |
Failing gracefully: Decryption failures and the Fujisaki-Okamoto transform. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Aloni Cohen, Sarah Scheffler, Mayank Varia |
Can the Government Compel Decryption? Don't Trust - Verify. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Youngmo Kim, Byeongchan Park, Seok-Yoon Kim |
A Selective Encryption/Decryption Method of Sensitive Music Usage History Information on Theme, Background and Signal Music Blockchain Network. |
J. Web Eng. |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Lili Zhou, Xiaohui Li, Fei Tan, Yi Huang, Weina Ma |
A two-layer networks-based audio encryption/decryption scheme via fixed-time cluster synchronization. |
Soft Comput. |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Harriet Farlow, Belinda M. Edwards |
Shining a light on 'going dark': A framework to guide the co-design and communication of decryption laws based on the passage of the Telecommunications and Other Legislation (Assistance and Access) Bill 2018. |
Comput. Law Secur. Rev. |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Anis Bkakria |
Robust, Revocable and Adaptively Secure Attribute-Based Access Control with Outsourced Decryption. |
IACR Cryptol. ePrint Arch. |
2022 |
DBLP BibTeX RDF |
|
15 | Kathrin Hövelmanns, Andreas Hülsing, Christian Majenz |
Failing gracefully: Decryption failures and the Fujisaki-Okamoto transform. |
IACR Cryptol. ePrint Arch. |
2022 |
DBLP BibTeX RDF |
|
15 | Alexandru Ionita |
Weighted Attribute-Based Encryption with Parallelized Decryption. |
IACR Cryptol. ePrint Arch. |
2022 |
DBLP BibTeX RDF |
|
15 | Cas Cremers, Mang Zhao |
Provably Post-Quantum Secure Messaging with Strong Compromise Resilience and Immediate Decryption. |
IACR Cryptol. ePrint Arch. |
2022 |
DBLP BibTeX RDF |
|
15 | Mohammad Mahmoody, Wei Qi, Ahmadreza Rahimi |
Lower Bounds for the Number of Decryption Updates in Registration-Based Encryption. |
IACR Cryptol. ePrint Arch. |
2022 |
DBLP BibTeX RDF |
|
15 | Diego F. Aranha, Carsten Baum, Kristian Gjøsteen, Tjerand Silde |
Verifiable Mix-Nets and Distributed Decryption for Voting from Lattice-Based Assumptions. |
IACR Cryptol. ePrint Arch. |
2022 |
DBLP BibTeX RDF |
|
15 | Bhuvnesh Chaturvedi, Anirban Chakraborty 0003, Ayantika Chatterjee, Debdeep Mukhopadhyay |
Demystifying the comments made on "A Practical Full Key Recovery Attack on TFHE and FHEW by Inducing Decryption Errors". |
IACR Cryptol. ePrint Arch. |
2022 |
DBLP BibTeX RDF |
|
15 | Daniel Fallnich, Shutao Zhang, Tobias Gemmeke |
Efficient ASIC Architectures for Low Latency Niederreiter Decryption. |
IACR Cryptol. ePrint Arch. |
2022 |
DBLP BibTeX RDF |
|
15 | Joseph Bebel, Dev Ojha |
Ferveo: Threshold Decryption for Mempool Privacy in BFT networks. |
IACR Cryptol. ePrint Arch. |
2022 |
DBLP BibTeX RDF |
|
15 | Ambili K. N, Jimmy Jose |
Ensuring Accountability and Outsourced Decryption in IoT Systems using Ciphertext-Policy Attribute-Based Encryption. |
IACR Cryptol. ePrint Arch. |
2022 |
DBLP BibTeX RDF |
|
15 | Bhuvnesh Chaturvedi, Anirban Chakraborty 0003, Ayantika Chatterjee, Debdeep Mukhopadhyay |
A Practical Full Key Recovery Attack on TFHE and FHEW by Inducing Decryption Errors. |
IACR Cryptol. ePrint Arch. |
2022 |
DBLP BibTeX RDF |
|
15 | Melissa Azouaoui, Olivier Bronchain, Clément Hoffmann, Yulia Kuzovkova, Tobias Schneider 0002, François-Xavier Standaert |
Systematic Study of Decryption and Re-Encryption Leakage: the Case of Kyber. |
IACR Cryptol. ePrint Arch. |
2022 |
DBLP BibTeX RDF |
|
15 | Yi Ding 0003, Fuyuan Tan, Zhen Qin 0002, Mingsheng Cao, Kim-Kwang Raymond Choo, Zhiguang Qin |
DeepKeyGen: A Deep Learning-Based Stream Cipher Generator for Medical Image Encryption and Decryption. |
IEEE Trans. Neural Networks Learn. Syst. |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Mohit Dua, Drishti Makhija, Pilla Yamini Lakshmi Manasa, Prashant Mishra |
3D chaotic map-cosine transformation based approach to video encryption and decryption. |
Open Comput. Sci. |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Tjerand Silde |
Short Paper: Verifiable Decryption for BGV. |
Financial Cryptography Workshops |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Florian Wilkens, Steffen Haas, Johanna Amann, Mathias Fischer 0001 |
Passive, Transparent, and Selective TLS Decryption for Network Security Monitoring. |
SEC |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Jutiphat Chatsomsanga, Chawalit Benjangkaprasert |
Malware Developing Guide: Encryption and Decryption. |
ICACT |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Melissa Azouaoui, Olivier Bronchain, Clément Hoffmann, Yulia Kuzovkova, Tobias Schneider 0002, François-Xavier Standaert |
Systematic Study of Decryption and Re-encryption Leakage: The Case of Kyber. |
COSADE |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Mohammad Mahmoody, Wei Qi, Ahmadreza Rahimi |
Lower Bounds for the Number of Decryption Updates in Registration-Based Encryption. |
TCC (1) |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Aloni Cohen, Sarah Scheffler, Mayank Varia |
Can the Government Compel Decryption?: Don't Trust - Verify. |
CSLAW |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Alexandru Ionita |
Weighted Attribute-based Encryption with Parallelized Decryption. |
SECRYPT |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Johanna Maria Kirss, Peeter Laud, Nikita Snetkov, Jelizaveta Vakarjuk |
Server-Supported Decryption for Mobile Devices. |
STM |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Pengyong Ding, Zian Jin, Yizhong Liu, Min Sun, Hong Liu, Li Li, Xin Zhang |
Indistinguishable Obfuscated Encryption and Decryption Based on Transformer Model. |
SmartCom |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Kai Xiao |
Implementation Analysis of Encryption and Decryption Algorithm Based on python Language. |
ICSCC |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Bianca Jansen Van Rensburg, William Puech, Jean-Pierre Pedeboy |
A Hierarchical Decryption Method for an Eco-Friendly Securing of 3D Objects. |
MMSP |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Kathrin Hövelmanns, Andreas Hülsing, Christian Majenz |
Failing Gracefully: Decryption Failures and the Fujisaki-Okamoto Transform. |
ASIACRYPT (4) |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Jeroen Pijnenburg, Bertram Poettering |
On Secure Ratcheting with Immediate Decryption. |
ASIACRYPT (3) |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Anis Bkakria |
Robust and Provably Secure Attribute-Based Encryption Supporting Access Revocation and Outsourced Decryption. |
DBSec |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Jan-Pieter D'Anvers, Senne Batsleer |
Multitarget Decryption Failure Attacks and Their Application to Saber and Kyber. |
Public Key Cryptography (1) |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Kristian Gjøsteen, Thomas Haines, Johannes Müller 0001, Peter B. Rønne, Tjerand Silde |
Verifiable Decryption in the Head. |
ACISP |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Yen-Cheng Chiu, Chia-Sheng Yang, Shih-Hsih Teng, Hsiao-Yu Huang, Fu-Chun Chang, Yuan Wu 0009, Yu-An Chien, Fang-Ling Hsieh, Chung-Yuan Li, Guan-Yi Lin, Po-Jung Chen, Tsen-Hsiang Pan, Chung-Chuan Lo, Win-San Khwa, Ren-Shuo Liu, Chih-Cheng Hsieh, Kea-Tiong Tang, Chieh-Pu Lo, Yu-Der Chih, Tsung-Yung Jonathan Chang, Meng-Fan Chang |
A 22nm 4Mb STT-MRAM Data-Encrypted Near-Memory Computation Macro with a 192GB/s Read-and-Decryption Bandwidth and 25.1-55.1TOPS/W 8b MAC for AI Operations. |
ISSCC |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Zahra Azad, Guowei Yang, Rashmi Agrawal 0001, Daniel Petrisko, Michael B. Taylor, Ajay Joshi |
RACE: RISC-V SoC for En/decryption Acceleration on the Edge for Homomorphic Computation. |
ISLPED |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Hiroto Kai, Shinnosuke Takamichi, Sayaka Shiota, Hitoshi Kiya |
Robustness of Signal Processing-Based Pseudonymization Method Against Decryption Attack. |
Odyssey |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Akihiro Yamamura |
Blind Decryption and Private Information Delivery. |
MobiSec |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Bita Noori, Pedram Salehpoor, Hadi S. Aghdasi |
RGB image Encryption and Decryption with Neural Chaotic Functions. |
CSICC |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Ahmed Maache, Anouar Touati, Ayoub Ouali |
Implementation of an AES-based real-time Video Encryption/Decryption using FPGA/HPS. |
SSD |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Alberto Ibarrondo, Hervé Chabanne, Vincent Despiegel, Melek Önen |
Colmade: Collaborative Masking in Auditable Decryption for BFV-based Homomorphic Encryption. |
IH&MMSec |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Ke Li, Hua Li, Graeme Mund |
A 32-bit efficient subpipelined architecture for AES encryption and decryption. |
CIS |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Boyue Fang, Weize Wang, Yunlei Zhao |
Tight Analysis of Decryption Failure Probability of Kyber in Reality. |
ICICS |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Pattavee Sanchol, Somchart Fugkeaw, Hiroyuki Sato |
A Mobile Cloud-based Access Control with Efficiently Outsourced Decryption. |
MobileCloud |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Decong Lin, Hongbo Cao, Chunzi Tian, Yongqi Sun |
The Fast Paillier Decryption with Montgomery Modular Multiplication Based on OpenMP. |
PAAP |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Uk Hur, Myungseo Park, Giyoon Kim, Younjai Park, Insoo Lee, Jongsung Kim |
Corrigendum to "Data acquisition methods using backup data decryption of sony smartphones" [Foren. Sci. Int: Digital Investigation 31 (2019) 200890]. |
Digit. Investig. |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Xingting Dong, Yupu Hu, Baocang Wang, Momeng Liu, Wen Gao 0010 |
Lattice-based revocable attribute-based encryption with decryption key exposure resistance. |
IET Inf. Secur. |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Nabeil Eltayieb, Rashad Elhabob, Alzubair Hassan, Fagen Li |
Secure mobile health system supporting search function and decryption verification. |
J. Ambient Intell. Humaniz. Comput. |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Yi Ding 0003, Guozheng Wu, Dajiang Chen, Ning Zhang 0007, Linpeng Gong, Mingsheng Cao, Zhiguang Qin |
DeepEDN: A Deep-Learning-Based Image Encryption and Decryption Network for Internet of Medical Things. |
IEEE Internet Things J. |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Dilip Kumar 0005, Manoj Kumar, Gaurav Gupta 0003 |
An Outsourced Decryption ABE Model using ECC in Internet of Things. |
Int. J. Uncertain. Fuzziness Knowl. Based Syst. |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Florian Unterstein, Nisha Jacob, Neil Hanley, Chongyan Gu, Johann Heyszl |
SCA secure and updatable crypto engines for FPGA SoC bitstream decryption: extended version. |
J. Cryptogr. Eng. |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Andrés Romero-Arellano, Ernesto Moya-Albor, Jorge Brieva, Iván Cruz-Aceves, Juan Gabriel Aviña-Cervantes, Martha Alicia Hernandez-Gonzalez, Luis Miguel Lopez-Montero |
Image Encryption and Decryption System through a Hybrid Approach Using the Jigsaw Transform and Langton's Ant Applied to Retinal Fundus Images. |
Axioms |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Suhui Liu, Jiguo Yu, Chunqiang Hu, Mengmeng Li |
Traceable Multiauthority Attribute-Based Encryption with Outsourced Decryption and Hidden Policy for CIoT. |
Wirel. Commun. Mob. Comput. |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Guangbo Wang, Feng Li, Pengcheng Wang, Yixiao Hu |
Traceable Ciphertet-Policy Attribute-Based Encryption with Constant Decryption. |
KSII Trans. Internet Inf. Syst. |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Chen Gao, Zidong Wang, Xiao He 0001, Hongli Dong |
Encryption-decryption-based consensus control for multi-agent systems: Handling actuator faults. |
Autom. |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Atsushi Takayasu, Yohei Watanabe 0001 |
Revocable identity-based encryption with bounded decryption key exposure resistance: Lattice-based construction and more. |
Theor. Comput. Sci. |
2021 |
DBLP DOI BibTeX RDF |
|