-
101
Low Cost Safety Data Storage and Processing Framework Under Cloud Environment
Published 2015-02-01Subjects: Get full text
Article -
102
Chaotic image encryption algorithm based on single image local scrambling and dynamic feedback diffusion
Published 2016-11-01Subjects: Get full text
Article -
103
Research on cloud dynamic public key information security based on elliptic curve and primitive Pythagoras
Published 2025-02-01Subjects: Get full text
Article -
104
Matrix computation over homomorphic plaintext-ciphertext and its application
Published 2024-02-01Subjects: “…homomorphic encryption…”
Get full text
Article -
105
Reversible data hiding in encrypted images using recompression
Published 2015-09-01Subjects: Get full text
Article -
106
Control research and application of conventional operations without real-time networks
Published 2020-01-01Subjects: Get full text
Article -
107
Efficient secure federated learning aggregation framework based on homomorphic encryption
Published 2023-01-01Subjects: Get full text
Article -
108
Application of Classical and Genomic Cryptography on Textual Dataset
Published 2024-12-01Subjects: “…genomic (dna) encryption…”
Get full text
Article -
109
Cloud Trustworthiness Evaluation as a cloud service:architecture,key technologies and implementations
Published 2016-10-01Subjects: Get full text
Article -
110
Data leakage prevention system based on transparent encryption for mobile terminal equipment
Published 2016-10-01Subjects: Get full text
Article -
111
Adaptive Asymptotic Shape Synchronization of a Chaotic System with Applications for Image Encryption
Published 2024-12-01Subjects: Get full text
Article -
112
Video compression and encryption coding scheme based on zero tree
Published 2007-01-01Subjects: Get full text
Article -
113
A Randomized Non‐overlapping Encryption Scheme for Enhanced Image Security in Internet of Things (IoT) Applications
Published 2025-01-01Subjects: Get full text
Article -
114
Data security protection schema of telecom operators under the environment of big data
Published 2017-05-01Subjects: Get full text
Article -
115
Efficient and secure multi-user outsourced image retrieval scheme with access control
Published 2021-10-01Subjects: Get full text
Article -
116
Group-oriented ciphertext-policy attribute-based encryption with expressive access policy
Published 2017-05-01Subjects: “…attribute-based encryption…”
Get full text
Article -
117
Implementation and evaluation of big data desensitization system based on format-preserving encryption
Published 2017-03-01Subjects: Get full text
Article -
118
A Novel Scheme for Construction of S-Box Using Action of Power Associative Loop and Its Applications in Text Encryption
Published 2024-01-01Subjects: Get full text
Article -
119
Research on technology of data encryption and search based on access broker
Published 2018-07-01Subjects: Get full text
Article -
120
Design and implementation of low-cost hardware architecture for authentication encryption algorithm SM4-GCM
Published 2023-12-01Subjects: Get full text
Article