-
1
Diegif: An efficient and secured DICOM to EGIF conversion framework for confidentiality in machine learning training
Published 2025-03-01Subjects: Get full text
Article -
2
Deep learning-based encryption scheme for medical images using DCGAN and virtual planet domain
Published 2025-01-01Subjects: Get full text
Article -
3
Medical Image Encryption and Decryption Based on DNA: A Survey
Published 2023-09-01Subjects: Get full text
Article -
4
ID-based threshold decryption with non-reconstruction of the private key
Published 2009-01-01Subjects: Get full text
Article -
5
A Randomized Non‐overlapping Encryption Scheme for Enhanced Image Security in Internet of Things (IoT) Applications
Published 2025-01-01Subjects: Get full text
Article -
6
Group-oriented ciphertext-policy attribute-based encryption with expressive access policy
Published 2017-05-01Subjects: Get full text
Article -
7
Verifiable outsourced attribute-based encryption with access update
Published 2019-02-01Subjects: Get full text
Article -
8
Research on cloud storage systems supporting secure sharing
Published 2017-10-01Subjects: Get full text
Article -
9
Correlation calculation decrypting for BSS-based image cryptosystem
Published 2008-01-01Subjects: Get full text
Article -
10
Destruction strategy for disks based on AES encrypted storage
Published 2018-04-01Subjects: Get full text
Article -
11
CP-ABE scheme supporting partially hidden access policy
Published 2024-10-01Subjects: Get full text
Article -
12
Outsourced attribute-based encryption with policy update
Published 2016-05-01Subjects: Get full text
Article -
13
Multi-ciphertext batch auditable decryption outsourcing SM9-HIBE key encapsulation mechanism
Published 2023-12-01Subjects: Get full text
Article -
14
Attribute-based encryption scheme supporting attribute revocation in cloud storage environment
Published 2019-05-01Subjects: Get full text
Article -
15
Attribute-based bilateral access control scheme for cloud storage
Published 2024-04-01Subjects: Get full text
Article -
16
Privacy-preserving ADP for secure tracking control of AVRs against unreliable communication
Published 2025-01-01Subjects: Get full text
Article -
17
Stochastic job stream scheduling method for cipher chip with multi-cryptography
Published 2016-12-01Subjects: “…cross encryption and decryption…”
Get full text
Article -
18
Partially hidden policy multi-authority CP-ABE scheme with constant length ciphertext
Published 2024-08-01Subjects: Get full text
Article -
19
Attribute-based proxy re-encryption scheme with multiple features
Published 2019-06-01Subjects: Get full text
Article -
20
Adaptively secure key-policy ABE scheme with fast decryption
Published 2014-11-01Subjects: Get full text
Article