The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for encrypted with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1965-1987 (19) 1988-1991 (16) 1992-1994 (15) 1995-1996 (20) 1997-1998 (31) 1999 (21) 2000 (31) 2001 (40) 2002 (57) 2003 (62) 2004 (100) 2005 (153) 2006 (164) 2007 (165) 2008 (200) 2009 (143) 2010 (82) 2011 (85) 2012 (89) 2013 (143) 2014 (177) 2015 (200) 2016 (253) 2017 (279) 2018 (386) 2019 (470) 2020 (427) 2021 (458) 2022 (444) 2023 (469) 2024 (118)
Publication types (Num. hits)
article(2306) book(2) data(7) incollection(20) inproceedings(2942) phdthesis(35) proceedings(5)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1140 occurrences of 654 keywords

Results
Found 5317 publication records. Showing 5317 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
10Jee-Tae Park, Ui-Jun Baek, Chang-Yui Shin, Min-Seong Lee, Jeong-Woo Choi, Myung-Sup Kim Network User Action Detection based on PSD Signature through Encrypted Traffic Analysis. Search on Bibsonomy APNOMS The full citation details ... 2023 DBLP  BibTeX  RDF
10Mingyu Li, Xuyang Zhao, Le Chen, Cheng Tan 0005, Huorong Li, Sheng Wang 0011, Zeyu Mi, Yubin Xia, Feifei Li 0001, Haibo Chen 0001 Encrypted Databases Made Secure Yet Maintainable. Search on Bibsonomy OSDI The full citation details ... 2023 DBLP  BibTeX  RDF
10Zolboo Erdenebaatar, Riyad Alshammari, Biswajit Nandy, Nabil Seddigh, Marwa Elsayed, Nur Zincir-Heywood Depicting Instant Messaging Encrypted Traffic Characteristics through an Empirical Study. Search on Bibsonomy ICCCN The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Shaiju Panchikkil, Vaibav Reddy Malpeddi, Vazhora Malayil Manikandan A Random-key Based Second-level Encryption for Reversible Data Hiding in Encrypted Images. Search on Bibsonomy NCC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Chuang Gan, Yuchong Hu, Leyan Zhao, Xin Zhao, Pengyu Gong, Wenhao Zhang, Lin Wang, Dan Feng Enabling Encrypted Delta Compression for Outsourced Storage Systems via Preserving Similarity. Search on Bibsonomy ICCD The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Yongming Chen, Yuzhou Tong, Bah-Hwee Gwee, Qi Cao 0002, Sirajudeen Gulam Razul, Zhiping Lin 0001 Real-time Traffic Classification in Encrypted Wireless Communication Network. Search on Bibsonomy ISCAS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Yinbin Miao, Chao Xu, Yifeng Zheng, Ximeng Liu, Xiangdong Meng, Robert H. Deng Efficient and Secure Spatial Range Query over Large-scale Encrypted Data. Search on Bibsonomy ICDCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Luca Ferretti, Mattia Trabucco, Mauro Andreolini, Mirco Marchetti How (not) to Index Order Revealing Encrypted Databases. Search on Bibsonomy ITASEC The full citation details ... 2023 DBLP  BibTeX  RDF
10Rodrigo Stange Tessinari, Robert I. Woodward, Andrew J. Shields Software-Defined Quantum Network Using a QKD-Secured SDN Controller and Encrypted Messages. Search on Bibsonomy OFC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Hongmiao Yu, Jiachen Chen, K. K. Ramakrishnan [DEMO] ABE to the Rescue: Efficient Encrypted Communications for Disaster Management. Search on Bibsonomy ICNP The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Jiakun Sun, Jintian Lu, Yabo Wang, Shuyuan Jin FastDet: Detecting Encrypted Malicious Traffic Faster via Early Exit. Search on Bibsonomy ICA3PP (1) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Mahdee Jodayree, Wenbo He, Ryszard Janicki Preventing Text Data Poisoning Attacks in Federated Machine Learning by an Encrypted Verification Key. Search on Bibsonomy IJCRS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Shaolong Tang, Jie Liu, Xiaoyao Luo, Peng Jiang, Keke Gai, Lei Xu 0016, Liehuang Zhu Blockchain-Empowered Search Over Encrypted Data With Forward and Backward Privacy. Search on Bibsonomy BSCI The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Hongwu Peng, Ran Ran, Yukui Luo, Jiahui Zhao, Shaoyi Huang, Kiran Thorat, Tong Geng, Chenghong Wang, Xiaolin Xu, Wujie Wen, Caiwen Ding LinGCN: Structural Linearized Graph Convolutional Network for Homomorphically Encrypted Inference. Search on Bibsonomy NeurIPS The full citation details ... 2023 DBLP  BibTeX  RDF
10Mengxin Zheng, Fan Chen 0001, Lei Jiang 0001, Qian Lou PriML: An Electro-Optical Accelerator for Private Machine Learning on Encrypted Data. Search on Bibsonomy ISQED The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Fuhu Wu, Lin Wang, Shun Zhang 0002, Jie Cui 0004, Hong Zhong 0001 Reversible Data Hiding in Encrypted Images Based on Block Classification Coding of Sparse Representation. Search on Bibsonomy ProvSec The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Hao Zhu, Fagen Li, Lihui Liu, Yong Zeng, Xiaoli Li, Jianfeng Ma 0001 Signcryption-Based Encrypted Traffic Detection Scheme for Fast Establishing Secure Connections. Search on Bibsonomy ProvSec The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Mazharul Islam, Rajesh Palit A Keyword Based Searching and Sharing Scheme on the Encrypted Cloud Data. Search on Bibsonomy ICCCNT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Giorgi Akhalaia, Maksim Iavich, Giorgi Iashvili, Dmytro Prysiazhnyy, Tetiana Smirnova Secure Encrypted Connection on Georgian Website (short paper). Search on Bibsonomy CPITS II The full citation details ... 2023 DBLP  BibTeX  RDF
10Gabriel A. Morales, Adam Bienek-Parrish, Patrick Jenkins, Rocky Slavin Protocol-agnostic IoT Device Classification on Encrypted Traffic Using Link-Level Flows. Search on Bibsonomy CPS-IoT Week Workshops The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Kenta Nagao, Natsuki Kawaguchi, Takao Sato Encrypted Data-driven Control on Networked Multi-agent Systems. Search on Bibsonomy ICNSC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Minghao Jiang, Mingxin Cui, Chengshang Hou, Wei Cai, Zhen Li 0011, Gang Xiong 0001, Gaopeng Gou FA-Net: More Accurate Encrypted Network Traffic Classification Based on Burst with Self-Attention. Search on Bibsonomy IJCNN The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Elham Akbari, Sheikh A. Tahmid, Navid Malekghaini, Mohammad Ali Salahuddin 0001, Noura Limam, Raouf Boutaba, Bertrand Mathieu, Stephanie Moteau, Stéphane Tuffin A Critical Study of Few-Shot Learning for Encrypted Traffic Classification. Search on Bibsonomy CNSM The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Tzu-Li Liu, Yu-Te Ku, Ming-Chien Ho, Feng-Hao Liu, Ming-Ching Chang, Chih-Fan Hsu, Wei-Chao Chen, Shih-Hao Hung An Efficient CKKS-FHEW/TFHE Hybrid Encrypted Inference Framework. Search on Bibsonomy ESORICS Workshops (2) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Tae Min Ahn, Kang Hoon Lee, Joon Soo Yoo, Ji Won Yoon Cheap and Fast Iterative Matrix Inverse in Encrypted Domain. Search on Bibsonomy ESORICS (1) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Kunming Song, Caizhen Zhang Design of secure AES encrypted IP cores for IoT environments. Search on Bibsonomy EITCE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Fatema Bannat Wala, Scott Campbell, Mariam Kiran Insights into DoH: Traffic Classification for DNS over HTTPS in an Encrypted Network. Search on Bibsonomy SNTA@HPDC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Michael Brenner 0003, Anamaria Costache, Kurt Rohloff (eds.) Proceedings of the 11th Workshop on Encrypted Computing & Applied Homomorphic Cryptography, Copenhagen, Denmark, 26 November 2023 Search on Bibsonomy WAHC@CCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Marcin Chrapek, Mikhail Khalilov, Torsten Hoefler HEAR: Homomorphically Encrypted Allreduce. Search on Bibsonomy SC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Pierre-Emmanuel Clet, Aymen Boudguiga, Renaud Sirdey, Martin Zuber ComBo: A Novel Functional Bootstrapping Method for Efficient Evaluation of Nonlinear Functions in the Encrypted Domain. Search on Bibsonomy AFRICACRYPT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Yingming Zeng, Pengfei Chen, Jingpeng Zhang Monitoring and Analysis of Encrypted Attack Traffic Based on Machine Learning. Search on Bibsonomy HCCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Yanguo Peng, Rongqiao Liu, Xiyue Gao, Luyuan Huang, Jingjing Guo, Yaofeng Tu SecCT: Secure and scalable count query models on encrypted genomic data. Search on Bibsonomy PRDC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Junseung You, Kyeongryong Lee, Hyungon Moon, Yeongpil Cho, Yunheung Paek KVSEV: A Secure In-Memory Key-Value Store with Secure Encrypted Virtualization. Search on Bibsonomy SoCC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Jason Hussey, Kerri Stone, Tracy Camp Generalizing Machine Learning Models for Zero-Day Encrypted Messaging Applications. Search on Bibsonomy MILCOM The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Gareth T. Davies, Sebastian H. Faller, Kai Gellert, Tobias Handirk, Julia Hesse, Máté Horváth, Tibor Jager Security Analysis of the WhatsApp End-to-End Encrypted Backup Protocol. Search on Bibsonomy CRYPTO (4) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Xuan Chen, Shujie Cui Fault-tolerant Verifiable Encrypted Search on Blockchain. Search on Bibsonomy Blockchain The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Xiaofeng Zhao, Shane Kosieradzki, Jun Ueda Distributed Simulation of Encrypted Dynamics via Functional Mockup Units. Search on Bibsonomy SII The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Naoto Shono, Tetsuro Miyazaki, Kaoru Teranishi, Kiminao Kogiso, Kenji Kawashima A False Data Injection Attack Model Targeting Passivity of Encrypted Wave Variable Based Bilateral Control System. Search on Bibsonomy SII The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Weixun Li, Guanghui Sun, Yajun Wang, Long Yuan, Minghui Gao, Yan Dong, Chen Wang Deep Neural Network Model over Encrypted Data. Search on Bibsonomy EISA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Ran Ran, Xinwei Luo, Wei Wang, Tao Liu 0023, Gang Quan, Xiaolin Xu, Caiwen Ding, Wujie Wen SpENCNN: Orchestrating Encoding and Sparsity for Fast Homomorphically Encrypted Neural Network Inference. Search on Bibsonomy ICML The full citation details ... 2023 DBLP  BibTeX  RDF
10Lusia Rakhmawati, Hapsari Peni Agustin Tjahyaningtijas, Wiyli Yustanti Double-encrypted Watermark Image in Dual Domain for Authentication and Recovery. Search on Bibsonomy IoTaIS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Cuong Dao, Van Tong, Nam-Thang Hoang, Hai Anh Tran, Truong X. Tran Enhancing Encrypted Traffic Classification with Deep Adaptation Networks. Search on Bibsonomy LCN The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Pia Baumstark, David Monschein, Oliver P. Waldhorst Secure Plaintext Acquisition of Homomorphically Encrypted Results for Remote Processing. Search on Bibsonomy LCN The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Qi Wu 0013, Shuo Wen, Boliang Liu A Method for Identifying Encrypted Webshell Traffic. Search on Bibsonomy ICCSIE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Raghav Malik, Kabir Sheth, Milind Kulkarni 0001 Coyote: A Compiler for Vectorizing Encrypted Arithmetic Circuits. Search on Bibsonomy ASPLOS (3) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Alessandro Languasco A Partially Decentralised Protocol for a Distributed Encrypted Storage System. Search on Bibsonomy UCAmI (3) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Mengxin Zheng, Qian Lou, Lei Jiang 0001 Primer: Fast Private Transformer Inference on Encrypted Data. Search on Bibsonomy DAC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Rei Aso, Sayaka Shiota, Hitoshi Kiya Enhanced Security with Encrypted Vision Transformer in Federated Learning. Search on Bibsonomy GCCE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Ryota Iijima, Miki Tanaka, Sayaka Shiota, Hitoshi Kiya Enhanced Security against Adversarial Examples Using a Random Ensemble of Encrypted Vision Transformer Models. Search on Bibsonomy GCCE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Tanveer Khan, Khoa Nguyen 0005, Antonis Michalas Split Ways: Privacy-Preserving Training of Encrypted Data Using Split Learning. Search on Bibsonomy EDBT/ICDT Workshops The full citation details ... 2023 DBLP  BibTeX  RDF
10Andrei Stoian, Jordan Fréry, Roman Bredehoft, Luis Montero, Celia Kherfallah, Benoît Chevallier-Mames Deep Neural Networks for Encrypted Inference with TFHE. Search on Bibsonomy CSCML The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Nir Drucker, Itamar Zimerman Efficient Skip Connections Realization for Secure Inference on Encrypted Data. Search on Bibsonomy CSCML The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Berker Acir, Ertan Onur, Cansu Betin Onur Finding Islands on Encrypted Graphs. Search on Bibsonomy SIU The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Yongjun Kong, Minqing Zhang, Zhang Xiong 0003, Zhechao Song Different Embedding Frameworks of Reversible Information Hiding in Encrypted Domain. Search on Bibsonomy CAIBDA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Ahmed Ramzi Bahlali, Abdelmalik Bachir, Abdelhakim Cheriet Malicious Encrypted Network Traffic Detection Using Deep Auto-Encoder with a Custom Reconstruction Loss. Search on Bibsonomy ISNCC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Xu Liu 0010, Zhang Liu, Xiaojing Zhao, Zhengwei Ren Mal-lightDet: A light method to detect malicious encrypted traffic based on machine learning. Search on Bibsonomy CCRIS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Tohid Behdadnia, Geert Deconinck, Can Ozkan, Dave Singelée Encrypted Traffic Classification for Early-Stage Anomaly Detection in Power Grid Communication Network. Search on Bibsonomy ISGT EUROPE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Yicheng Zou, Yaling Zhang, Chao Wang, Tao Zhang, Yu Zhang Reversible Data Hiding in Encrypted Images Based on Image Reprocessing and Polymorphic Compression. Search on Bibsonomy ICONIP (14) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Xiwen Luo, Qiang Fu, Sheng Qin, Kaiyang Wang Encrypted-SNN: A Privacy-Preserving Method for Converting Artificial Neural Networks to Spiking Neural Networks. Search on Bibsonomy ICONIP (2) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Yingzhu Wang, Xiehua Li, Wanting Lei, Sijie Li Privacy-Preserving Image Classification and Retrieval Scheme over Encrypted Images. Search on Bibsonomy ICONIP (11) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Vanice Canuto Cunha Timely Classification of Encrypted or Protocol­-Obfuscated Internet Traffic Using Statistical Methods. (Classification rapide de trafic internet chiffré ou obscurci par utilisation de méthodes statistiques). Search on Bibsonomy 2023   RDF
10Chenghong Wang Encrypted Data Management Systems with tunable Privacy. Search on Bibsonomy 2023   RDF
10Intak Hwang, Jinyeong Seo, Yongsoo Song Optimizing HE operations via Level-aware Key-switching Framework. Search on Bibsonomy WAHC@CCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Morten Dahl, Daniel Demmler, Sarah El Kazdadi, Arthur Meyre, Jean-Baptiste Orfila, Dragos Rotaru, Nigel P. Smart, Samuel Tap, Michael Walter 0001 Noah's Ark: Efficient Threshold-FHE Using Noise Flooding. Search on Bibsonomy WAHC@CCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Boyoung Han, Yeonghyeon Kim, Jina Choi, Hojune Shin, Younho Lee Fully Homomorphic Privacy-Preserving Naive Bayes Machine Learning and Classification. Search on Bibsonomy WAHC@CCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Daphné Trama, Pierre-Emmanuel Clet, Aymen Boudguiga, Renaud Sirdey A Homomorphic AES Evaluation in Less than 30 Seconds by Means of TFHE. Search on Bibsonomy WAHC@CCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Arnaud Grivet Sébert, Martin Zuber, Oana Stan, Renaud Sirdey, Cédric Gouy-Pailler A Probabilistic Design for Practical Homomorphic Majority Voting with Intrinsic Differential Privacy. Search on Bibsonomy WAHC@CCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Rashmi Agrawal 0001, Jung Ho Ahn, Flavio Bergamaschi, Ro Cammarota, Jung Hee Cheon, Fillipe D. M. de Souza, Huijing Gong, Minsik Kang, Duhyeong Kim, Jongmin Kim 0007, Hubert de Lassus, Jai Hyun Park, Michael Steiner 0001, Wen Wang 0007 High-precision RNS-CKKS on fixed but smaller word-size architectures: theory and application. Search on Bibsonomy WAHC@CCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Thibault Balenbois, Jean-Baptiste Orfila, Nigel P. Smart Trivial Transciphering With Trivium and TFHE. Search on Bibsonomy WAHC@CCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Mariya Georgieva Belorgey, Sofia Dandjee, Nicolas Gama, Dimitar Jetchev, Dmitry Mikushin Falkor: Federated Learning Secure Aggregation Powered by AESCTR GPU Implementation. Search on Bibsonomy WAHC@CCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Shintaro Narisada, Hiroki Okada 0001, Kazuhide Fukushima, Shinsaku Kiyomoto, Takashi Nishide GPU Acceleration of High-Precision Homomorphic Computation Utilizing Redundant Representation. Search on Bibsonomy WAHC@CCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Amir Mohammad Naseri, Walter Lucia, Amr M. Youssef Encrypted Cloud-Based Set-Theoretic Model Predictive Control. Search on Bibsonomy IEEE Control. Syst. Lett. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
10Moritz Fauser, Ping Zhang 0022 Detection of Cyber Attacks in Encrypted Control Systems. Search on Bibsonomy IEEE Control. Syst. Lett. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
10Fabio De Gaspari, Dorjan Hitaj, Giulio Pagnotta, Lorenzo De Carli, Luigi V. Mancini Reliable detection of compressed and encrypted data. Search on Bibsonomy Neural Comput. Appl. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
10Ahmad Al Badawi, Ling Chen, Saru Vig Fast homomorphic SVM inference on encrypted data. Search on Bibsonomy Neural Comput. Appl. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
10Vikas Chouhan, Sateesh Kumar Peddoju, Rajkumar Buyya dualDup: A secure and reliable cloud storage framework to deduplicate the encrypted data and key. Search on Bibsonomy J. Inf. Secur. Appl. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
10Yi-Fan Tseng, Chun-I Fan, Zi-Cheng Liu 0001 Fast keyword search over encrypted data with short ciphertext in clouds. Search on Bibsonomy J. Inf. Secur. Appl. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
10Sisheng Chen, Chin-Chen Chang 0001 Reversible data hiding in encrypted images using block-based adaptive MSBs prediction. Search on Bibsonomy J. Inf. Secur. Appl. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
10Uk Hur, Myungseo Park, Jongsung Kim A reused key attack on an encrypted mobile app database: Case study on KakaoTalk and ProtonMail. Search on Bibsonomy J. Inf. Secur. Appl. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
10Eduardo Berrueta, Daniel Morató, Eduardo Magaña, Mikel Izal Crypto-ransomware detection using machine learning models in file-sharing network scenarios with encrypted traffic. Search on Bibsonomy Expert Syst. Appl. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
10Dawen Xu 0001 Reversible data hiding in encrypted images with high payload. Search on Bibsonomy IET Inf. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
10Zhangguo Tang, Junfeng Wang, Baoguo Yuan, Huanzhou Li, Jian Zhang, Han Wang Markov-GAN: Markov image enhancement method for malicious encrypted traffic classification. Search on Bibsonomy IET Inf. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
10Ankit Agrawal 0003, Ashutosh Bhatia, Ayush Bahuguna, Kamlesh Tiwari, K. Haribabu 0001, Deepak Vishwakarma, Rekha Kaushik A survey on analyzing encrypted network traffic of mobile devices. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
10Shushan Zhao An improved scheme for image scaling, cropping and colour correction in encrypted domain. Search on Bibsonomy Int. J. Multim. Intell. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
10Madushi H. Pathmaperuma, Yogachandran Rahulamathavan, Safak Dogan, Ahmet M. Kondoz CNN for User Activity Detection Using Encrypted In-App Mobile Data. Search on Bibsonomy Future Internet The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
10Angelo Massimo Perillo, Giuseppe Persiano, Alberto Trombetta Secure Selections on Encrypted Multi-writer Streams. Search on Bibsonomy ACM Trans. Priv. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
10Andreas Fischer 0011, Benny Fuhry, Jörn Kußmaul, Jonas Janneck, Florian Kerschbaum, Eric Bodden Computation on Encrypted Data Using Dataflow Authentication. Search on Bibsonomy ACM Trans. Priv. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
10Nipuna Senanayake, Robert Podschwadt, Daniel Takabi, Vince D. Calhoun, Sergey M. Plis NeuroCrypt: Machine Learning Over Encrypted Distributed Neuroimaging Data. Search on Bibsonomy Neuroinformatics The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
10Yousheng Zhou, Kexin Liu, Pandi Vijayakumar FTPS: Efficient fault-tolerant dynamic phrase search over outsourced encrypted data with forward and backward privacy. Search on Bibsonomy Concurr. Comput. Pract. Exp. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
10Kai Gao, Ji-Hwei Horng, Chin-Chen Chang 0001 High-capacity reversible data hiding in encrypted images based on adaptive block encoding. Search on Bibsonomy J. Vis. Commun. Image Represent. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
10Xu Wang 0027, Ching-Chun Chang, Chia-Chen Lin 0001, Chin-Chen Chang 0001 Reversal of pixel rotation: A reversible data hiding system towards cybersecurity in encrypted images. Search on Bibsonomy J. Vis. Commun. Image Represent. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
10Ammar Mohammadi A general framework for reversible data hiding in encrypted images by reserving room before encryption. Search on Bibsonomy J. Vis. Commun. Image Represent. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
10Mariusz Dzwonkowski, Bartosz Czaplewski Reversible data hiding in encrypted DICOM images using sorted binary sequences of pixels. Search on Bibsonomy Signal Process. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
10Wan-Li Lyu, Lulu Cheng, Zhaoxia Yin High-capacity reversible data hiding in encrypted 3D mesh models based on multi-MSB prediction. Search on Bibsonomy Signal Process. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
10Xueling Zhu, Shaojing Fu, Huaping Hu, Qing Wu 0004, Bo Liu 0014 Efficient boolean SSE: A novel encrypted database (EDB) for biometric authentication. Search on Bibsonomy Int. J. Intell. Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
10Yunling Wang, Pei Wei, Meixia Miao, Xuefeng Zhang 0004 Verifiable dynamic search over encrypted data in cloud-assisted intelligent systems. Search on Bibsonomy Int. J. Intell. Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
10Shaohua Zhao, Hua Zhang 0001, Xin Zhang, Wenmin Li 0001, Fei Gao 0001, Qiaoyan Wen Forward privacy multikeyword ranked search over encrypted database. Search on Bibsonomy Int. J. Intell. Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
10Na Xu, Jin Tang 0001, Bin Luo 0001, Zhaoxia Yin Separable Reversible Data Hiding Based on Integer Mapping and MSB Prediction for Encrypted 3D Mesh Models. Search on Bibsonomy Cogn. Comput. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
10Axel Feldmann, Nikola Samardzic, Aleksandar Krastev, Srinivas Devadas, Ronald G. Dreslinski, Chris Peikert, Daniel Sánchez 0003 An Architecture to Accelerate Computation on Encrypted Data. Search on Bibsonomy IEEE Micro The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
10Dongliang Bian, Jun Pan, Yanhui Wang Study of Encrypted Transmission of Private Data During Network Communication: Performance Comparison of Advanced Encryption Standard and Data Encryption Standard Algorithms. Search on Bibsonomy J. Cyber Secur. Mobil. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
Displaying result #901 - #1000 of 5317 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license