Results 281 to 290 of about 327,487 (331)
Optimizing color image security using hybrid cryptographic techniques based on sine and logistic maps. [PDF]
Koulouh F +5 more
europepmc +1 more source
A data privacy protection method for infectious disease prediction models with balanced training speed and accuracy. [PDF]
Wang X +9 more
europepmc +1 more source
Research on searchable encryption scheme based on enhanced PIR
TANG Liang, MA Limin
openalex +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Encrypted PRNG by Logic Encryption
2020 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), 2020In this paper, the authors consider such an area of information security as logical encryption. Logical encryption is one of the most important methods of hardware protection, which introduces additional key inputs into a given combinational scheme to protect functionality from unauthorized use.
Marina A. Kiryakina +2 more
openaire +1 more source
Image encryption: Generating visually meaningful encrypted images
Information Sciences, 2015zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Long Bao, Yicong Zhou
openaire +2 more sources
ACM SIGSAC Review, 1992
As we place more trust in our computer systems, we must continue to find more ways to make our systems deserving of that trust. Encryption is one of those ways.
openaire +2 more sources
As we place more trust in our computer systems, we must continue to find more ways to make our systems deserving of that trust. Encryption is one of those ways.
openaire +2 more sources
1999
Public-key algorithms use a secret element and a public element to their code. One of the main algorithms is RSA. Compared with DES it is relatively slow but it has the advantage that users can choose their own key whenever they need one. The most commonly used public-key cryptosystems are covered in the next sections.
openaire +1 more source
Public-key algorithms use a secret element and a public element to their code. One of the main algorithms is RSA. Compared with DES it is relatively slow but it has the advantage that users can choose their own key whenever they need one. The most commonly used public-key cryptosystems are covered in the next sections.
openaire +1 more source

