-
61
L’alternative monétaire Bitcoin : une perspective institutionnaliste
Published 2015-12-01Subjects: Get full text
Article -
62
Research and design of authenticated encryption algorithm based on AES round function
Published 2020-04-01Subjects: “…authenticated encryption algorithm…”
Get full text
Article -
63
New cryptanalysis of the authenticated cipher model JAMBU
Published 2017-07-01Subjects: Get full text
Article -
64
Diegif: An efficient and secured DICOM to EGIF conversion framework for confidentiality in machine learning training
Published 2025-03-01Subjects: Get full text
Article -
65
-
66
A new mathematical model to improve encryption process based on Split-Radix Fast Fourier Transform algorithm
Published 2025-01-01Subjects: “…encryption…”
Get full text
Article -
67
Fully homomorphic encryption scheme from RLWE
Published 2014-01-01Subjects: “…fully homomorphic encryption…”
Get full text
Article -
68
Deep learning-based encryption scheme for medical images using DCGAN and virtual planet domain
Published 2025-01-01Subjects: Get full text
Article -
69
Privacy-preserving mining of association rules based on paillier encryption algorithm
Published 2016-01-01Subjects: Get full text
Article -
70
Privacy preserving friend discovery cross domain scheme using re-encryption in mobile social networks
Published 2017-10-01Subjects: Get full text
Article -
71
EPN:encryption padding for NTRU with provable security
Published 2008-01-01Subjects: Get full text
Article -
72
Data encryption technology based on cloud and terminal collaboration
Published 2018-02-01Subjects: Get full text
Article -
73
Hybrid-structured onion scheme against replay attack of MIX
Published 2009-01-01Subjects: Get full text
Article -
74
Decentralized searchable encryption scheme based on dynamic accumulator
Published 2019-04-01Subjects: Get full text
Article -
75
Implementation and Performance of Lightweight Authentication Encryption ASCON on IoT Devices
Published 2025-01-01Subjects: Get full text
Article -
76
Research on Information Security Mechanism Used in Network Video Surveillance System
Published 2013-08-01Subjects: Get full text
Article -
77
Self-adaptive encryption algorithm for image based on affine and composed chaos
Published 2012-11-01Subjects: “…image encryption…”
Get full text
Article -
78
Privacy protection scheme for internet of vehicles based on homomorphic encryption and block chain technology
Published 2020-02-01Subjects: Get full text
Article -
79
Medical Image Encryption and Decryption Based on DNA: A Survey
Published 2023-09-01Subjects: Get full text
Article -
80
EAEBHCM:an extended attribute encryption based hidden credentials model
Published 2012-12-01Subjects: Get full text
Article