Results 331 to 340 of about 230,478 (367)
Some of the next articles are maybe not open access.
Evaluating the security of logic encryption algorithms
IEEE International Symposium on Hardware Oriented Security and Trust, 2015Contemporary integrated circuits are designed and manufactured in a globalized environment leading to concerns of piracy, overproduction and counterfeiting. One class of techniques to combat these threats is logic encryption. Logic encryption modifies an
P. Subramanyan, Sayak Ray, S. Malik
semanticscholar +1 more source
Symmetric encryption and XML encryption patterns
Proceedings of the 16th Conference on Pattern Languages of Programs, 2009Most of the time information handled by organizations has been collected and processed by computers and transmitted across networks to other computers. How can we protect this information from unauthorized access when it is being transmitted? Encryption provides confidentiality by protecting sensitive information from being read by intruders.
Keiko Hashizume, Eduardo B. Fernandez
openaire +2 more sources
2021 2nd International Conference on Computing and Data Science (CDS), 2021
In the current scenario, various forms of information are spread everywhere, especially through the Internet. A lot of valuable information is contained in the dissemination, so security issues have always attracted attention. With the emergence of cryptographic algorithms, information security has been further improved.
openaire +2 more sources
In the current scenario, various forms of information are spread everywhere, especially through the Internet. A lot of valuable information is contained in the dissemination, so security issues have always attracted attention. With the emergence of cryptographic algorithms, information security has been further improved.
openaire +2 more sources
Proxy Re-Encryption Based on Homomorphic Encryption
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017In this paper, we propose an homomorphic proxy re-encryption scheme (HPRE) that allows different users to share data they outsourced homomorphically encrypted using their respective public keys with the possibility by next to process such data remotely.
Bellafqira, Reda+4 more
openaire +3 more sources
Network Security, 2008
Encryption has been trumpeted as the be-all and end-all of network security, and there has been a universal rush in its implementation following the widely reported series of severe data security breaches. However, those who rush into it without putting in place a comprehensive security policy are in danger of becoming complacent, leaving themselves ...
openaire +2 more sources
Encryption has been trumpeted as the be-all and end-all of network security, and there has been a universal rush in its implementation following the widely reported series of severe data security breaches. However, those who rush into it without putting in place a comprehensive security policy are in danger of becoming complacent, leaving themselves ...
openaire +2 more sources
2009
Publisher Summary Depending on the type of satellite communications link that needs to be established, substantially different technologies, frequencies, and data encryption techniques might be required. The reasons for this lie as much in the realm of human behavior as they do in the realm of physics. It is not unreasonable to conclude that satellite
openaire +4 more sources
Publisher Summary Depending on the type of satellite communications link that needs to be established, substantially different technologies, frequencies, and data encryption techniques might be required. The reasons for this lie as much in the realm of human behavior as they do in the realm of physics. It is not unreasonable to conclude that satellite
openaire +4 more sources
Homomorphic Encryption for Arithmetic of Approximate Numbers
International Conference on the Theory and Application of Cryptology and Information Security, 2017J. Cheon+3 more
semanticscholar +1 more source
Color image encryption using orthogonal Latin squares and a new 2D chaotic system
Nonlinear dynamics, 2021Zhongyun Hua+3 more
semanticscholar +1 more source