skip to main content
Resultados 1 2 3 4 5 next page
Mostrar Somente
Result Number Material Type Add to My Shelf Action Record Details and Options
1
Privacy‐preserving federated learning based on multi‐key homomorphic encryption
Material Type:
Artigo
Adicionar ao Meu Espaço

Privacy‐preserving federated learning based on multi‐key homomorphic encryption

Ma, Jing ; Naas, Si‐Ahmed ; Sigg, Stephan ; Lyu, Xixiang

International journal of intelligent systems, 2022-09, Vol.37 (9), p.5880-5901 [Periódico revisado por pares]

New York: Hindawi Limited

Texto completo disponível

2
Enhanced Lorenz-Chaotic Encryption Method for Partial Medical Image Encryption and Data Hiding in Big Data Healthcare
Material Type:
Artigo
Adicionar ao Meu Espaço

Enhanced Lorenz-Chaotic Encryption Method for Partial Medical Image Encryption and Data Hiding in Big Data Healthcare

Rashmi, P. ; Supriya, M. C. ; Hua, Qiaozhi Chakraborty, Chinmay ; Chinmay Chakraborty

Security and communication networks, 2022-02, Vol.2022, p.1-9 [Periódico revisado por pares]

London: Hindawi

Texto completo disponível

3
Flexible privacy‐preserving machine learning: When searchable encryption meets homomorphic encryption
Material Type:
Artigo
Adicionar ao Meu Espaço

Flexible privacy‐preserving machine learning: When searchable encryption meets homomorphic encryption

Jia, Haixin ; Aldeen, Mohammed S. ; Zhao, Chuan ; Jing, Shan ; Chen, Zhenxiang

International journal of intelligent systems, 2022-11, Vol.37 (11), p.9173-9191 [Periódico revisado por pares]

New York: Hindawi Limited

Texto completo disponível

4
Computer Network Security Management of Data Encryption Technology
Material Type:
Artigo
Adicionar ao Meu Espaço

Computer Network Security Management of Data Encryption Technology

Sun, Caiping ; Wang, Weijiang Hashmi, Mohammad Farukh ; Mohammad Farukh Hashmi

Wireless communications and mobile computing, 2022-09, Vol.2022, p.1-9 [Periódico revisado por pares]

Oxford: Hindawi

Texto completo disponível

5
Image Encryption with Double Spiral Scans and Chaotic Maps
Material Type:
Artigo
Adicionar ao Meu Espaço

Image Encryption with Double Spiral Scans and Chaotic Maps

Tang, Zhenjun ; Yang, Ye ; Xu, Shijie ; Yu, Chunqiang ; Zhang, Xianquan Del Rey, Angel M. ; Angel M Del Rey

Security and communication networks, 2019-01, Vol.2019, p.1-15 [Periódico revisado por pares]

London: Hindawi

Texto completo disponível

6
IIBE: An Improved Identity-Based Encryption Algorithm for WSN Security
Material Type:
Artigo
Adicionar ao Meu Espaço

IIBE: An Improved Identity-Based Encryption Algorithm for WSN Security

Cao, ChunHua ; Tang, YaNa ; Huang, DeYan ; Gan, WeiMin ; Zhang, Chunjiong Su, Jian ; Jian Su

Security and communication networks, 2021, Vol.2021, p.1-8 [Periódico revisado por pares]

London: Hindawi

Texto completo disponível

7
Application Research of Data Encryption Algorithm in Computer Security Management
Material Type:
Artigo
Adicionar ao Meu Espaço

Application Research of Data Encryption Algorithm in Computer Security Management

Gong, Qianru Nagaraj, Balakrishnan ; Balakrishnan Nagaraj

Wireless communications and mobile computing, 2022-07, Vol.2022, p.1-7 [Periódico revisado por pares]

Oxford: Hindawi

Texto completo disponível

8
An efficient blockchain‐based privacy‐preserving scheme with attribute and homomorphic encryption
Material Type:
Artigo
Adicionar ao Meu Espaço

An efficient blockchain‐based privacy‐preserving scheme with attribute and homomorphic encryption

Xu, Guangxia ; Zhang, Jiajun ; Cliff, Uchani Gutierrez Omar ; Ma, Chuang

International journal of intelligent systems, 2022-12, Vol.37 (12), p.10715-10750 [Periódico revisado por pares]

New York: Hindawi Limited

Texto completo disponível

9
Practical wildcard searchable encryption with tree‐based index
Material Type:
Artigo
Adicionar ao Meu Espaço

Practical wildcard searchable encryption with tree‐based index

Zhang, Xi ; Zhao, Bo ; Qin, Jing ; Hou, Wei ; Su, Ye ; Yang, Haining

International journal of intelligent systems, 2021-12, Vol.36 (12), p.7475-7499 [Periódico revisado por pares]

New York: Hindawi Limited

Texto completo disponível

10
Encryption Technology for Computer Network Data Security Protection
Material Type:
Artigo
Adicionar ao Meu Espaço

Encryption Technology for Computer Network Data Security Protection

Yu, Yang Venkatesan, C. ; C Venkatesan

Security and communication networks, 2022-08, Vol.2022, p.1-9 [Periódico revisado por pares]

London: Hindawi

Texto completo disponível

Resultados 1 2 3 4 5 next page

Personalize Seus Resultados

  1. Editar

Refine Search Results

Expandir Meus Resultados

  1.   

Mostrar Somente

  1. Revistas revisadas por pares (3.265)

Data de Publicação 

De até
  1. Antes de2006  (10)
  2. 2006Até2009  (31)
  3. 2010Até2013  (249)
  4. 2014Até2018  (1.038)
  5. Após 2018  (1.941)
  6. Mais opções open sub menu

Idioma 

  1. Japonês  (107)
  2. Norueguês  (1)
  3. Mais opções open sub menu

Buscando em bases de dados remotas. Favor aguardar.