The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for decryption with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1980-1988 (16) 1989-1993 (16) 1994-1997 (27) 1998 (18) 1999 (15) 2000 (23) 2001 (37) 2002 (55) 2003 (67) 2004 (75) 2005 (97) 2006 (102) 2007 (105) 2008 (99) 2009 (90) 2010 (37) 2011 (27) 2012 (22) 2013 (20) 2014 (32) 2015 (39) 2016 (42) 2017 (32) 2018 (45) 2019 (69) 2020 (65) 2021 (56) 2022 (71) 2023 (58) 2024 (13)
Publication types (Num. hits)
article(474) incollection(6) inproceedings(988) phdthesis(2)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1021 occurrences of 506 keywords

Results
Found 1470 publication records. Showing 1470 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
15Mande Xie, Jifei Hu, Haibo Hong Blockchain-Based CP-ABE with Publicly Verifiable Outsourced Decryption in IoT. Search on Bibsonomy FCS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
15Aditya Sarin, Deveshi Thanawala, Saurav Verma, Chetana Prakash Implementation of New Approach to Secure IoT Networks with Encryption and Decryption Techniques. Search on Bibsonomy ICCCNT The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
15Xavier Boyen, Thomas Haines, Johannes Müller 0001 A Verifiable and Practical Lattice-Based Decryption Mix Net with External Auditing. Search on Bibsonomy ESORICS (2) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
15Tomonori Hirata, Yuichi Kaji Information leakage through passive timing attacks on RSA decryption system. Search on Bibsonomy ISITA The full citation details ... 2020 DBLP  BibTeX  RDF
15Dominik Ziegler 0001, Alexander Marsalek, Bernd Prünster, Josef Sabongui Efficient Access-control in the IIoT through Attribute-Based Encryption with Outsourced Decryption. Search on Bibsonomy ICETE (2) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
15Xincheng Yan, Yue Chen, Yuchang Zhai, Yang Ba, Xuewei Li, Hongyong Jia An Encryption and Decryption Outsourcing CP-ABE scheme Supporting Efficient Ciphertext Evolution. Search on Bibsonomy ICCSP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
15Analyn Niere Yumang, Ericson D. Dimaunahan, Jose B. Lazaro, Joshua Luis T. Marinas, John Emmanuel G. Logatoc Encryption and Decryption of Vital Signs Information through a Symmetric based Cryptography Algorithm. Search on Bibsonomy ICBET The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
15Georg Maringer, Tim Fritzmann, Johanna Sepúlveda The Influence of LWE/RLWE Parameters on the Stochastic Dependence of Decryption Failures. Search on Bibsonomy ICICS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
15Yongnan Li Encryption and Decryption in Conic Curves Cryptosystem Over Finite Field GF(2n) Using Tile Self-assembly. Search on Bibsonomy PAAP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
15Ying Fang, Tianlong Gu, Liang Chang 0003, Long Li 0005 Algebraic Decision Diagram-Based CP-ABE with Constant Secret and Fast Decryption. Search on Bibsonomy CyberC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
15Uk Hur, Myungseo Park, Giyoon Kim, Younjai Park, Insoo Lee, Jongsung Kim Data acquisition methods using backup data decryption of Sony smartphones. Search on Bibsonomy Digit. Investig. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15David Nuñez 0001, Isaac Agudo, Javier López 0001 Escrowed decryption protocols for lawful interception of encrypted data. Search on Bibsonomy IET Inf. Secur. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15P. Mathivanan, A. Balaji Ganesh, R. Venkatesan 0001 QR code-based ECG signal encryption/decryption algorithm. Search on Bibsonomy Cryptologia The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Jianhuan Su, Yinjun Zhang, Mengji Chen Cover and iterative learning control for and decryption in secure communication. Search on Bibsonomy Photonic Netw. Commun. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Shengmin Xu, Guomin Yang, Yi Mu 0001 Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation. Search on Bibsonomy Inf. Sci. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Baodong Qin, Qinglan Zhao, Dong Zheng 0001, Hui Cui 0001 (Dual) server-aided revocable attribute-based encryption with decryption key exposure resistance. Search on Bibsonomy Inf. Sci. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Jindan Zhang, Baocang Wang, Fatos Xhafa, Xu An Wang 0001, Cong Li Energy-efficient secure outsourcing decryption of attribute based encryption for mobile device in cloud computation. Search on Bibsonomy J. Ambient Intell. Humaniz. Comput. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Baodong Qin, Dong Zheng 0001 Generic Approach to Outsource the Decryption of Attribute-Based Encryption in Cloud Computing. Search on Bibsonomy IEEE Access The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Leyou Zhang, Gongcheng Hu, Yi Mu 0001, Fatemeh Rezaeibagha Hidden Ciphertext Policy Attribute-Based Encryption With Fast Decryption for Personal Health Record System. Search on Bibsonomy IEEE Access The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Ningbo Li, Tanping Zhou, Xiaoyuan Yang 0002, Yiliang Han, Wenchao Liu 0002, Guangsheng Tu Efficient Multi-Key FHE With Short Extended Ciphertexts and Directed Decryption Protocol. Search on Bibsonomy IEEE Access The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Zhidan Li, Wenmin Li 0001, Zhengping Jin, Hua Zhang 0001, Qiaoyan Wen An Efficient ABE Scheme With Verifiable Outsourced Encryption and Decryption. Search on Bibsonomy IEEE Access The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni 0001 Compact circuits for combined AES encryption/decryption. Search on Bibsonomy J. Cryptogr. Eng. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Bárbara Emma Sánchez-Rinza, Juan Carlos García Lezama Hill Algorithm Decryption using Parallel Calculations by Brute Force. Search on Bibsonomy Res. Comput. Sci. The full citation details ... 2019 DBLP  BibTeX  RDF
15Yacheng Wang, Yasuhiko Ikematsu, Dung Hoang Duong, Tsuyoshi Takagi The Secure Parameters and Efficient Decryption Algorithm for Multivariate Public Key Cryptosystem EFC. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Yunling Wang, Jianfeng Wang, Shifeng Sun 0001, Joseph K. Liu, Willy Susilo, Joonsang Baek, Ilsun You, Xiaofeng Chen 0001 Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption. Search on Bibsonomy J. Univers. Comput. Sci. The full citation details ... 2019 DBLP  BibTeX  RDF
15Dong Xie 0005, Fulong Chen 0002, Yonglong Luo, Lixiang Li 0001 One-to-many image encryption with privacy-preserving homomorphic outsourced decryption based on compressed sensing. Search on Bibsonomy Digit. Signal Process. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Mohammed Alsaedi Image Encryption and Decryption Using Chua's Circuits. Search on Bibsonomy Int. J. Commun. Networks Inf. Secur. The full citation details ... 2019 DBLP  BibTeX  RDF
15Amjad Yosef Hendi, Majed O. Dwairi, Ziad Abdulkareem Al-Qadi, Mohamed S. Soliman A NOVEL SIMPLE AND HIGHLY SECURE METHOD FOR DATA ENCRYPTION-DECRYPTION. Search on Bibsonomy Int. J. Commun. Networks Inf. Secur. The full citation details ... 2019 DBLP  BibTeX  RDF
15Inam ul Haq, Jian Wang 0038, Youwen Zhu An Efficient Authenticated Key Agreement Scheme for Consumer USB MSDs Resilient to Unauthorized File Decryption. Search on Bibsonomy IEEE Trans. Consumer Electron. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Hasan Rashaideh, Ahmad Shaheen, Nijad Al-Najdawi Real-time image encryption and decryption methods based on the Karhunen-Loeve transform. Search on Bibsonomy Int. J. Intell. Eng. Informatics The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Imad El Ghoubach, Rachid Ben Abbou, Fatiha Mrabti Efficient and secure data sharing with outsourced decryption and efficient revocation for cloud storage systems. Search on Bibsonomy Int. J. Secur. Networks The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Qian Xu 0008, Chengxiang Tan, Wenye Zhu, Ya Xiao, Zhijie Fan, Fujia Cheng Decentralized attribute-based conjunctive keyword search scheme with online/offline encryption and outsource decryption for cloud computing. Search on Bibsonomy Future Gener. Comput. Syst. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Shengmin Xu, Guomin Yang, Yi Mu 0001, Ximeng Liu A secure IoT cloud storage system with fine-grained access control and decryption key exposure resistance. Search on Bibsonomy Future Gener. Comput. Syst. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Qian Guo 0001, Thomas Johansson 0001, Jing Yang 0025 A Novel CCA Attack using Decryption Errors against LAC. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2019 DBLP  BibTeX  RDF
15Yanyan Liu, Yiru Sun Generic Construction of Server-Aided Revocable Hierarchical Identity-Based Encryption with Decryption Key Exposure Resistance. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2019 DBLP  BibTeX  RDF
15Jiwon Lee, Jaekyoung Choi, Jihye Kim, Hyunok Oh SAVER: Snark-friendly, Additively-homomorphic, and Verifiable Encryption and decryption with Rerandomization. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2019 DBLP  BibTeX  RDF
15Sean Murphy, Rachel Player A Central Limit Framework for Ring-LWE Decryption. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2019 DBLP  BibTeX  RDF
15Georg Maringer, Tim Fritzmann, Johanna Sepúlveda The Influence of LWE/RLWE Parameters on the Stochastic Dependence of Decryption Failures. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2019 DBLP  BibTeX  RDF
15Marcel Armour, Bertram Poettering Subverting Decryption in AEAD. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2019 DBLP  BibTeX  RDF
15Qian Guo 0001, Thomas Johansson 0001, Alexander Nilsson A Generic Attack on Lattice-based Schemes using Decryption Errors with Application to ss-ntru-pke. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2019 DBLP  BibTeX  RDF
15Zvika Brakerski, Nico Döttling, Sanjam Garg, Giulio Malavolta Leveraging Linear Decryption: Rate-1 Fully-Homomorphic Encryption and Time-Lock Puzzles. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2019 DBLP  BibTeX  RDF
15Lynn Margaret Batten, Hugh Cowie Williams Unique Rabin-Williams Signature Scheme Decryption. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2019 DBLP  BibTeX  RDF
15Nina Bindel, John M. Schanck Decryption failure is more likely after success. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2019 DBLP  BibTeX  RDF
15Thijs Veugen, Thomas Attema, Gabriele Spini An implementation of the Paillier crypto system with threshold decryption without a trusted dealer. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2019 DBLP  BibTeX  RDF
15Georg Saxl, Manuel Ferdik, Moritz Fischer, Martin Maderboeck, Thomas Ussmueller UHF RFID Prototyping Platform for ISO 29167 Decryption Based on an SDR. Search on Bibsonomy Sensors The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Subhan Ullah, Lucio Marcenaro, Bernhard Rinner Secure Smart Cameras by Aggregate-Signcryption with Decryption Fairness for Multi-Receiver IoT Applications. Search on Bibsonomy Sensors The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Zhu Wang 0008, Yan Yao, Xiaojun Tong, Qinghua Luo, Xiangyu Chen Dynamically Reconfigurable Encryption and Decryption System Design for the Internet of Things Information Security. Search on Bibsonomy Sensors The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Ronghai Gao, Jiwen Zeng, Lunzhi Deng An efficient certificateless multi-receiver threshold decryption scheme. Search on Bibsonomy RAIRO Theor. Informatics Appl. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Yinghui Zhang 0002, Axin Wu, Tiantian Zhang, Dong Zheng 0001 Secure and flexible keyword search over encrypted data with outsourced decryption in Internet of things. Search on Bibsonomy Ann. des Télécommunications The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Jongkil Kim, Seyit Camtepe, Willy Susilo, Surya Nepal, Joonsang Baek Identity-Based Broadcast Encryption with Outsourced Partial Decryption for Hybrid Security Models in Edge Computing. Search on Bibsonomy AsiaCCS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Florian Unterstein, Nisha Jacob, Neil Hanley, Chongyan Gu, Johann Heyszl SCA Secure and Updatable Crypto Engines for FPGA SoC Bitstream Decryption. Search on Bibsonomy ASHES@CCS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Jens Müller 0007, Fabian Ising, Vladislav Mladenov, Christian Mainka, Sebastian Schinzel, Jörg Schwenk Practical Decryption exFiltration: Breaking PDF Encryption. Search on Bibsonomy CCS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Peter Awon-Natemi Agbedemnab, Edward Yellakuor Baagyere, Mohammed Ibrahim Daabo A New Image Encryption and Decryption Technique using Genetic Algorithm and Residual Numbers. Search on Bibsonomy AFRICON The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Kazeem B. Adedeji, Nnamdi I. Nwulu, Clinton Aigbavboa, Saheed Lekan Gbadamosi Assessment of Encryption and Decryption Schemes for Secure Data Transmission in Healthcare Systems. Search on Bibsonomy AFRICON The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Blake Anderson, Andrew Chi, Scott Dunlop, David A. McGrew Limitless HTTP in an HTTPS World: Inferring the Semantics of the HTTPS Protocol without Decryption. Search on Bibsonomy CODASPY The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Mriganka Mandal, Ratna Dutta Efficient Identity-Based Outsider Anonymous Public-Key Trace and Revoke with Constant Ciphertext-Size and Fast Decryption. Search on Bibsonomy Inscrypt The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15B. Bazeer Ahamed, K. Murugan A Novel Approach to Overcome Dictionary and Plaintext Attack in SMS Encryption and Decryption Using Vignere Cipher. Search on Bibsonomy ICO The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Zvika Brakerski, Nico Döttling, Sanjam Garg, Giulio Malavolta Leveraging Linear Decryption: Rate-1 Fully-Homomorphic Encryption and Time-Lock Puzzles. Search on Bibsonomy TCC (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Yuanyuan Tang, Bin Zhu, Xiaojing Ma 0002, P. Takis Mathiopoulos, Xia Xie, Hong Huang 0001 Decoding Homomorphically Encrypted Flac Audio without Decryption. Search on Bibsonomy ICASSP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Wang Yao, Faguo Wu, Xiao Zhang 0004 Requester-Centric CP-ABE Combining Removing Escrow and Outsourcing Decryption. Search on Bibsonomy CSS (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15B. V. Varun, Abhishek M. V, Akshay Chanabasappa Gangadhar, U. Purushotham Implementation of Encryption and Decryption Algorithms for Security of Mobile Devices. Search on Bibsonomy ICCT The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Prabhanjan Ananth, Xiong Fan, Elaine Shi Towards Attribute-Based Encryption for RAMs from LWE: Sub-linear Decryption, and More. Search on Bibsonomy ASIACRYPT (1) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Qian Guo 0001, Thomas Johansson 0001, Jing Yang 0025 A Novel CCA Attack Using Decryption Errors Against LAC. Search on Bibsonomy ASIACRYPT (1) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Hui Zheng, Jun Shao 0001, Guiyi Wei, Li Hu, Bianjing Pan, Kai Liu, Xiaohang Mao Attribute-Based Encryption with Publicly Verifiable Outsourced Decryption. Search on Bibsonomy NSS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Shuichi Katsumata, Takahiro Matsuda 0002, Atsushi Takayasu Lattice-Based Revocable (Hierarchical) IBE with Decryption Key Exposure Resistance. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Jan-Pieter D'Anvers, Qian Guo 0001, Thomas Johansson 0001, Alexander Nilsson, Frederik Vercauteren, Ingrid Verbauwhede Decryption Failure Attacks on IND-CCA Secure Lattice-Based Schemes. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Mohammed Alsaedi Novel Scheme for Image Encryption and Decryption Based on a Hermite-Gaussian Matrix. Search on Bibsonomy CVC (1) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Peter Awon-Natemi Agbedemnab, Edward Yellakuor Baagyere, Mohammed Ibrahim Daabo A Novel Text Encryption and Decryption Scheme using the Genetic Algorithm and Residual Numbers. Search on Bibsonomy ICICIS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Emanuele Bellini 0002, Nadir Murru A Multi-factor RSA-like Scheme with Fast Decryption Based on Rédei Rational Functions over the Pell Hyperbola. Search on Bibsonomy NUMTA(1) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Dongxue Pan, Bei Liang, Hongda Li 0001, Peifang Ni Witness Encryption with (Weak) Unique Decryption and Message Indistinguishability: Constructions and Applications. Search on Bibsonomy ACISP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Michael Kraitsberg, Yehuda Lindell, Valery Osheter, Nigel P. Smart, Younes Talibi Alaoui Adding Distributed Decryption and Key Generation to a Ring-LWE Based CCA Encryption Scheme. Search on Bibsonomy ACISP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Anatoliy Kovalchuk, Ivan Izonin, Mihal Gregush, Natalia Lotoshynska An Approach Towards Image Encryption and Decryption using Quaternary Fractional-Linear Operations. Search on Bibsonomy EUSPN/ICTH The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Marcel Armour, Bertram Poettering Subverting Decryption in AEAD. Search on Bibsonomy IMACC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Kevin Herman Muraro Gularte, Luíza F. Q. Martins, José Alfredo Ruiz Vargas, João Paulo A. Maranhão, Willian A. M. Gabalan, Jesus Franklin Andrade Romero A Scheme for Encryption/Decryption based on Hyperchaotic Systems and Lyapunov Theory. Search on Bibsonomy ICSPCS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Youbing Zhong, Zhou Zhou 0007, Da Li 0002, Meijun Guo, Qingyun Liu, Yang Liu, Li Guo SAED: A Self-Adaptive Encryption and Decryption Architecture. Search on Bibsonomy ISPA/BDCloud/SocialCom/SustainCom The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Dai Long Hoang, Thi Hong Tran, Yasuhiko Nakashima Hardware Implementation of CORDIC Based Physical Layer Phase Decryption for IEEE 802.11ah. Search on Bibsonomy ICCBN The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Anatoliy Kovalchuk, Ivan Izonin, Christine Strauss, Mariia Podavalkina, Natalia Lotoshynska, Nataliya Kustra Image Encryption and Decryption Schemes Using Linear and Quadratic Fractal Algorithms and Their Systems. Search on Bibsonomy DCSMart The full citation details ... 2019 DBLP  BibTeX  RDF
15Ivan Tsmots, Yurii Tsymbal, Oleksa Skorokhoda, Roman Tkachenko Neural-like Methods and Hardware Structures for Real-time Data Encryption and Decryption. Search on Bibsonomy CSIT (3) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Marco Baldi, Alessandro Barenghi, Franco Chiaraluce, Gerardo Pelosi, Paolo Santini LEDAcrypt: QC-LDPC Code-Based Cryptosystems with Bounded Decryption Failure Rate. Search on Bibsonomy CBC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Nicolas T. Courtois Decryption oracle slide attacks on T-310. Search on Bibsonomy Cryptologia The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
15Kittur P. Kibiwott, Fengli Zhang, Anyembe Andrew Omala, Daniel Adu-Gyamfi Secure Cloudlet-based eHealth Big Data System with Fine-Grained Access Control and Outsourcing Decryption from ABE. Search on Bibsonomy Int. J. Netw. Secur. The full citation details ... 2018 DBLP  BibTeX  RDF
15Chitra Rajarama, Jagadeesha Narasimhamurthy Sugatoor, T. Yerri Swamy Diffie-Hellman Type Key Exchange, ElGamal Like Encryption/Decryption and Proxy Re-encryption Using Circulant Matrices. Search on Bibsonomy Int. J. Netw. Secur. The full citation details ... 2018 DBLP  BibTeX  RDF
15Jiguo Li 0001, Liqing Chen, Yang Lu 0001, Yichen Zhang 0003 Anonymous certificate-based broadcast encryption with constant decryption cost. Search on Bibsonomy Inf. Sci. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
15Huige Wang, Kefei Chen, Joseph K. Liu, Ziyuan Hu, Yu Long 0001 Access control encryption with efficient verifiable sanitized decryption. Search on Bibsonomy Inf. Sci. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
15Wei Yin 0004, Qiaoyan Wen, Kaitai Liang, Zhenfei Zhang, Liqun Chen 0002, Hanbing Yan, Hua Zhang 0001 Delegation of Decryption Rights With Revocability From Learning With Errors. Search on Bibsonomy IEEE Access The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
15Cong Li, Xiaoyuan Yang 0002, Yudong Liu, Yunfei Cao Functional encryption with efficient verifiable outsourced decryption for secure data access control in social network. Search on Bibsonomy Int. J. High Perform. Syst. Archit. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
15Chaminda Hewage, Ambikesh Jayal, Glenn L. Jenkins, Ryan J. Brown A Learned Polyalphabetic Decryption Cipher. Search on Bibsonomy Simul. Notes Eur. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
15Lakshmi Naga Divya Tamma, Shaik Shakeel Ahamad A novel chaotic hash-based attribute-based encryption and decryption on cloud computing. Search on Bibsonomy Int. J. Electron. Secur. Digit. Forensics The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
15Zhuhong Shao, Yuanyuan Shang, Qingbin Tong, Hui Ding, Xiaoxu Zhao, Xiaoyan Fu Multiple color image encryption and authentication based on phase retrieval and partial decryption in quaternion gyrator domain. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
15Qi Li 0011, Hongbo Zhu 0002, Zuobin Ying, Tao Zhang 0029 Traceable Ciphertext-Policy Attribute-Based Encryption with Verifiable Outsourced Decryption in eHealth Cloud. Search on Bibsonomy Wirel. Commun. Mob. Comput. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
15Rajavel Dhandabani, Shantharajah S. Periyasamy, Theagarajan Padma, Arun Kumar Sangaiah Six-face cubical key encryption and decryption based on product cipher using hybridisation and Rubik's cubes. Search on Bibsonomy IET Networks The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
15Hikaru Tsuchida, Takashi Nishide, Eiji Okamoto Expressive Ciphertext-Policy Attribute-Based Encryption with Fast Decryption. Search on Bibsonomy J. Internet Serv. Inf. Secur. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
15Jing Li 0006, Zhitao Guan, Xiaojiang Du, Zijian Zhang 0001, Jun Wu 0001 An Efficient Encryption Scheme with Verifiable Outsourced Decryption in Mobile Cloud Computing. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
15Blake Anderson, Andrew Chi, Scott Dunlop, David A. McGrew Limitless HTTP in an HTTPS World: Inferring the Semantics of the HTTPS Protocol without Decryption. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
15Zechao Liu, Zoe Lin Jiang, Xuan Wang 0002, Siu-Ming Yiu Practical attribute-based encryption: Outsourcing decryption, attribute revocation and policy updating. Search on Bibsonomy J. Netw. Comput. Appl. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
15Blake Anderson, Subharthi Paul, David A. McGrew Deciphering malware's use of TLS (without decryption). Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
15Cong Zuo, Jun Shao 0001, Guiyi Wei, Mande Xie, Min Ji 0001 CCA-secure ABE with outsourced decryption for fog computing. Search on Bibsonomy Future Gener. Comput. Syst. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
15Ming Li 0029, Hua Ren, En Zhang, Wei Wang 0166, Lin Sun 0002, Di Xiao 0001 A VQ-Based Joint Fingerprinting and Decryption Scheme for Secure and Efficient Image Distribution. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
15Wei Yin 0004, Qiaoyan Wen, Kaitai Liang, Zhenfei Zhang, Liqun Chen 0002, Hanbing Yan, Hua Zhang 0001 Delegation of Decryption Rights with Revocability from Learning with Errors. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2018 DBLP  BibTeX  RDF
15Jan-Pieter D'Anvers, Frederik Vercauteren, Ingrid Verbauwhede On the impact of decryption failures on the security of LWE/LWR based schemes. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2018 DBLP  BibTeX  RDF
Displaying result #501 - #600 of 1470 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license