-
261
PoSW:novel secure deduplication scheme for collaborative cloud applications
Published 2017-07-01Subjects: Get full text
Article -
262
Security decision method for the edge of multi-layer satellite network based on reinforcement learning
Published 2022-06-01Subjects: Get full text
Article -
263
New image encryption algorithm based on double chaotic system and compressive sensing
Published 2022-10-01Subjects: “…image encryption…”
Get full text
Article -
264
ID-based ring signature on prime order group from asymmetric pairing
Published 2021-09-01Subjects: Get full text
Article -
265
Approach to keyword search over encrypted data in cloud
Published 2014-11-01Subjects: Get full text
Article -
266
-
267
Survey on the privacy-preserving content based image retrieval
Published 2019-08-01Subjects: “…symmetric searchable encryption…”
Get full text
Article -
268
Research on the security of national secret algorithm based compute first networking
Published 2023-08-01Subjects: Get full text
Article -
269
Crayfish optimization based pixel selection using block scrambling based encryption for secure cloud computing environment
Published 2025-01-01Subjects: Get full text
Article -
270
A New Trend in Cryptographic Information Security for Industry 5.0: A Systematic Review
Published 2024-01-01Subjects: Get full text
Article -
271
Image Encryption Method Based on Three-Dimensional Chaotic Systems and V-Shaped Scrambling
Published 2025-01-01Subjects: “…image encryption…”
Get full text
Article -
272
Blockchain data sharing scheme based on localized difference privacy and attribute-based searchable encryption
Published 2023-05-01Subjects: “…attribute-based searchable encryption…”
Get full text
Article -
273
Efficient implementation for BFV fully homomorphic encryption algorithm based on Zynq platform
Published 2024-09-01Subjects: “…fully homomorphic encryption…”
Get full text
Article -
274
Privacy protection scheme of DBSCAN clustering based on homomorphic encryption
Published 2021-02-01Subjects: Get full text
Article -
275
Application of edge computing technology in smart grid data security
Published 2025-02-01Subjects: “…No certificate proxy blind signature encryption…”
Get full text
Article -
276
Escrow mechanism for personal security keys on IBE
Published 2009-01-01Subjects: Get full text
Article -
277
Attribute-based encryption with hidden policies in the access tree
Published 2015-09-01Subjects: “…attribute-based encryption…”
Get full text
Article -
278
Design and application research on management information system security architecture in digital campus
Published 2014-10-01Subjects: Get full text
Article -
279
Flexible Threshold Quantum Homomorphic Encryption on Quantum Networks
Published 2024-12-01Subjects: “…threshold quantum homomorphic encryption…”
Get full text
Article -
280
Solution of secure multi-party multi-data raking problem based on El Gamal encryption
Published 2007-01-01Subjects: “…E1 Gamal homomorphic encryption…”
Get full text
Article