Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Artigo
|
Encryption Policies for Regulating Access to Outsourced DataDE CAPITANI DI VIMERCATI, Sabrina ; FORESTI, Sara ; JAJODIA, Sushil ; PARABOSCHI, Stefano ; SAMARATI, PierangelaACM transactions on database systems, 2010-04, Vol.35 (2), p.1-46 [Periódico revisado por pares]New York, NY: Association for Computing MachineryTexto completo disponível |
|
2 |
Material Type: Artigo
|
Intelligent cybersecurity approach for data protection in cloud computing based Internet of ThingsMughaid, Ala ; Obeidat, Ibrahim ; Abualigah, Laith ; Alzubi, Shadi ; Daoud, Mohammad Sh ; Migdady, HazemInternational journal of information security, 2024-06, Vol.23 (3), p.2123-2137 [Periódico revisado por pares]Berlin/Heidelberg: Springer Berlin HeidelbergTexto completo disponível |
|
3 |
Material Type: Artigo
|
Integrity analysis of authenticated encryption based on stream ciphersImamura, Kazuya ; Minematsu, Kazuhiko ; Iwata, TetsuInternational journal of information security, 2018-10, Vol.17 (5), p.493-511 [Periódico revisado por pares]Berlin/Heidelberg: Springer Berlin HeidelbergTexto completo disponível |
|
4 |
Material Type: Artigo
|
Secure Hamming distance computation for biometrics using ideal-lattice and ring-LWE homomorphic encryptionYasuda, MasayaInformation security journal., 2017-03, Vol.26 (2), p.85-103 [Periódico revisado por pares]Abingdon: Taylor & FrancisTexto completo disponível |
|
5 |
Material Type: Artigo
|
Implementing public-key cryptography on passive RFID tags is practicalArbit, Alex ; Livne, Yoel ; Oren, Yossef ; Wool, AvishaiInternational journal of information security, 2015-02, Vol.14 (1), p.85-99 [Periódico revisado por pares]Berlin/Heidelberg: Springer Berlin HeidelbergTexto completo disponível |
|
6 |
Material Type: Artigo
|
Efficient and verifiable algorithms for secure outsourcing of cryptographic computationsKiraz, Mehmet Sabır ; Uzunkol, OsmanbeyInternational journal of information security, 2016-10, Vol.15 (5), p.519-537 [Periódico revisado por pares]Berlin/Heidelberg: Springer Berlin HeidelbergTexto completo disponível |
|
7 |
Material Type: Artigo
|
Privacy-enhanced architecture for smart meteringGómez Mármol, Félix ; Sorge, Christoph ; Petrlic, Ronald ; Ugus, Osman ; Westhoff, Dirk ; Martínez Pérez, GregorioInternational journal of information security, 2013-04, Vol.12 (2), p.67-82 [Periódico revisado por pares]Berlin/Heidelberg: Springer-VerlagTexto completo disponível |
|
8 |
Material Type: Artigo
|
Fully non-interactive onion routing with forward secrecyCatalano, Dario ; Di Raimondo, Mario ; Fiore, Dario ; Gennaro, Rosario ; Puglisi, OrazioInternational journal of information security, 2013-02, Vol.12 (1), p.33-47 [Periódico revisado por pares]Berlin/Heidelberg: Springer-VerlagTexto completo disponível |
|
9 |
Material Type: Artigo
|
BLACK-BOX CONSTRUCTIONS OF PROTOCOLS FOR SECURE COMPUTATIONHAITNER, Iftach ; ISHAI, Yuval ; KUSHILEVITZ, Eyal ; LINDELL, Yehuda ; PETPANK, ErezSIAM journal on computing, 2011-01, Vol.40 (2), p.225-266 [Periódico revisado por pares]Philadelphia, PA: Society for Industrial and Applied MathematicsTexto completo disponível |
|
10 |
Material Type: Artigo
|
Protecting data privacy through hard-to-reverse negative databasesEsponda, Fernando ; Ackley, Elena S. ; Helman, Paul ; Jia, Haixia ; Forrest, StephanieInternational journal of information security, 2007-10, Vol.6 (6), p.403-415 [Periódico revisado por pares]Heidelberg: Springer Nature B.VTexto completo disponível |