Results 171 to 180 of about 219,404 (221)
Reversible Data Hiding in Encrypted Images with Private Key Cryptography [PDF]
Volume 7 Issue 11 (November ...
Wajahath Hussain Razvi, Ch. Samson
openalex +1 more source
Jie Zhang, Futai Zhang, Xinyi Huang
openalex +2 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
IEEE Transactions on Dependable and Secure Computing, 2020
Mobile device and application (app) security are increasingly important, partly due to the constant and fast-paced cyberthreat evolution. To ensure the security of communication (e.g., data-in-transit), a number of identity-based signature schemes have ...
De-biao He+3 more
semanticscholar +1 more source
Mobile device and application (app) security are increasingly important, partly due to the constant and fast-paced cyberthreat evolution. To ensure the security of communication (e.g., data-in-transit), a number of identity-based signature schemes have ...
De-biao He+3 more
semanticscholar +1 more source
2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONIC ENGINEERING (ICCEEE), 2013
Virtual Private Networks have been efficient tools that provide inter-connectivity to exchange information between different (remote) parties that belong to a specific network. A virtual private network possesses all the features of the private networks and are built upon existing network, but they suffer severe security problems, particularly, the ...
Abeer E. W. Eldewahi, Eihab Basheir
openaire +2 more sources
Virtual Private Networks have been efficient tools that provide inter-connectivity to exchange information between different (remote) parties that belong to a specific network. A virtual private network possesses all the features of the private networks and are built upon existing network, but they suffer severe security problems, particularly, the ...
Abeer E. W. Eldewahi, Eihab Basheir
openaire +2 more sources
Introduction to Modern Cryptography
, 2020Preface I. Introduction and Classical Cryptography Introduction Cryptography and Modern Cryptography The Setting of Private-Key Encryption Historical Ciphers and Their Cryptanalysis Principles of Modern Cryptography Principle 1 - Formal Definitions ...
Jonathan Katz, Yehuda Lindell
semanticscholar +1 more source
Certificateless Public Key Cryptography in the Standard Model
Fundamenta Informaticae, 2018Identity-based cryptography has been introduced by Shamir at Crypto’84 to avoid the use of expensive certificates in certified public key cryptography. In such system, the identity becomes the public key and each user needs to interact with a designated ...
Sébastien Canard, V. Trinh
semanticscholar +1 more source
Circulant UOV: a new UOV variant with shorter private key and faster signature generation
KSII Transactions on Internet and Information Systems, 2018UOV is one of the most important signature schemes in Multivariate Public Key Cryptography (MPKC). It has a strong security guarantee and is considered to be quantum-resistant.
Zhiniang Peng, Shaohua Tang
semanticscholar +1 more source
, 2014
The term cryptography comes from the two Greek word skrupto and Graph which mean secret and writing. Cryptography is the process of disguising the messages which can only be read by sender and receiver.
A. Panwar
semanticscholar +1 more source
The term cryptography comes from the two Greek word skrupto and Graph which mean secret and writing. Cryptography is the process of disguising the messages which can only be read by sender and receiver.
A. Panwar
semanticscholar +1 more source