Results 231 to 240 of about 264,588 (256)
Some of the next articles are maybe not open access.
Image encryption: Generating visually meaningful encrypted images
Information Sciences, 2015zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Long Bao, Yicong Zhou
openaire +2 more sources
ACM SIGSAC Review, 1992
As we place more trust in our computer systems, we must continue to find more ways to make our systems deserving of that trust. Encryption is one of those ways.
openaire +2 more sources
As we place more trust in our computer systems, we must continue to find more ways to make our systems deserving of that trust. Encryption is one of those ways.
openaire +2 more sources
1999
Public-key algorithms use a secret element and a public element to their code. One of the main algorithms is RSA. Compared with DES it is relatively slow but it has the advantage that users can choose their own key whenever they need one. The most commonly used public-key cryptosystems are covered in the next sections.
openaire +1 more source
Public-key algorithms use a secret element and a public element to their code. One of the main algorithms is RSA. Compared with DES it is relatively slow but it has the advantage that users can choose their own key whenever they need one. The most commonly used public-key cryptosystems are covered in the next sections.
openaire +1 more source
Predicate Encryption and Functional Encryption
2021Seong Oun Hwang, Intae Kim, Wai Kong Lee
openaire +1 more source

