Results 331 to 340 of about 230,478 (367)
Some of the next articles are maybe not open access.

Evaluating the security of logic encryption algorithms

IEEE International Symposium on Hardware Oriented Security and Trust, 2015
Contemporary integrated circuits are designed and manufactured in a globalized environment leading to concerns of piracy, overproduction and counterfeiting. One class of techniques to combat these threats is logic encryption. Logic encryption modifies an
P. Subramanyan, Sayak Ray, S. Malik
semanticscholar   +1 more source

Symmetric encryption and XML encryption patterns

Proceedings of the 16th Conference on Pattern Languages of Programs, 2009
Most of the time information handled by organizations has been collected and processed by computers and transmitted across networks to other computers. How can we protect this information from unauthorized access when it is being transmitted? Encryption provides confidentiality by protecting sensitive information from being read by intruders.
Keiko Hashizume, Eduardo B. Fernandez
openaire   +2 more sources

An Overview and Analysis of Hybrid Encryption: The Combination of Symmetric Encryption and Asymmetric Encryption

2021 2nd International Conference on Computing and Data Science (CDS), 2021
In the current scenario, various forms of information are spread everywhere, especially through the Internet. A lot of valuable information is contained in the dissemination, so security issues have always attracted attention. With the emergence of cryptographic algorithms, information security has been further improved.
openaire   +2 more sources

Proxy Re-Encryption Based on Homomorphic Encryption

Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
In this paper, we propose an homomorphic proxy re-encryption scheme (HPRE) that allows different users to share data they outsourced homomorphically encrypted using their respective public keys with the possibility by next to process such data remotely.
Bellafqira, Reda   +4 more
openaire   +3 more sources

A fast and efficient multiple images encryption based on single-channel encryption and chaotic system

Nonlinear dynamics, 2022
Xinyu Gao   +5 more
semanticscholar   +1 more source

Desktop encryption

Network Security, 2008
Encryption has been trumpeted as the be-all and end-all of network security, and there has been a universal rush in its implementation following the widely reported series of severe data security breaches. However, those who rush into it without putting in place a comprehensive security policy are in danger of becoming complacent, leaving themselves ...
openaire   +2 more sources

Satellite Encryption

2009
Publisher Summary Depending on the type of satellite communications link that needs to be established, substantially different technologies, frequencies, and data encryption techniques might be required. The reasons for this lie as much in the realm of human behavior as they do in the realm of physics. It is not unreasonable to conclude that satellite
openaire   +4 more sources

Homomorphic Encryption for Arithmetic of Approximate Numbers

International Conference on the Theory and Application of Cryptology and Information Security, 2017
J. Cheon   +3 more
semanticscholar   +1 more source

Color image encryption using orthogonal Latin squares and a new 2D chaotic system

Nonlinear dynamics, 2021
Zhongyun Hua   +3 more
semanticscholar   +1 more source

Symmetric Encryption

2009
Michael Coles, Rodney Landrum
openaire   +2 more sources

Home - About - Disclaimer - Privacy