Suggested Topics within your search.
Showing 1 - 20 results of 810 for search '"encryption"', query time: 0.05s Refine Results
  1. 1
  2. 2
  3. 3

    Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms by Wisam Abed Shukur, Luheb Kareem Qurban, Ahmed Aljuboori

    Published 2023-08-01
    Subjects: “…Advanced Encryption Standard AES, Data Encryption Standard DES, Decryption, Encryption, Keys Encryption.…”
    Get full text
    Article
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10

    Multi-keyword attribute-based searchable encryption scheme supporting re-encryption for cloud storage by ZHANG Kejun, WANG Wenbin, XU Shaofei, YU Xinying, WANG Jun, LI Pengcheng, QIAN Rong

    Published 2024-09-01
    Subjects: “…searchable encryption;attribute-based encryption;read/write node;proxy re-encryption;access control…”
    Get full text
    Article
  11. 11
  12. 12

    Certificate-based hybrid encryption scheme in the standard model by KANG Li, TANG Xiao-hu, FAN Jia

    Published 2009-01-01
    Subjects: “…certificate-based encryption;identity-based encryption;standard model…”
    Get full text
    Article
  13. 13

    Public key searchable encryption scheme based on blockchain by Ruizhong DU, Ailun TAN, Junfeng TIAN

    Published 2020-04-01
    Subjects: “…searchable encryption…”
    Get full text
    Article
  14. 14

    The Multilevel Encryption Model: A review by Mais Irreem Kamal, Laheeb Ibrahim

    Published 2024-06-01
    Subjects: “…encryption model…”
    Get full text
    Article
  15. 15

    Public key searchable encryption scheme based on blockchain by Ruizhong DU, Ailun TAN, Junfeng TIAN

    Published 2020-04-01
    Subjects: “…searchable encryption;blockchain;smart contract;public key encryption…”
    Get full text
    Article
  16. 16

    Research on the searchable encryption by Peng XU, Hai JIN

    Published 2016-10-01
    Subjects: “…searchable encryption…”
    Get full text
    Article
  17. 17
  18. 18

    Certificate-based hybrid encryption scheme in the standard model by KANG Li, TANG Xiao-hu, FAN Jia

    Published 2009-01-01
    Subjects: “…certificate-based encryption…”
    Get full text
    Article
  19. 19
  20. 20