Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Artigo
|
![]() |
An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud ComputingShulan Wang ; Junwei Zhou ; Liu, Joseph K. ; Jianping Yu ; Jianyong Chen ; Weixin XieIEEE transactions on information forensics and security, 2016-06, Vol.11 (6), p.1265-1277 [Periódico revisado por pares]New York: IEEETexto completo disponível |
2 |
Material Type: Artigo
|
![]() |
An Efficient MSB Prediction-Based Method for High-Capacity Reversible Data Hiding in Encrypted ImagesPuteaux, Pauline ; Puech, WilliamIEEE transactions on information forensics and security, 2018-07, Vol.13 (7), p.1670-1681 [Periódico revisado por pares]New York: IEEETexto completo disponível |
3 |
Material Type: Artigo
|
![]() |
Attribute-Based Encryption With Verifiable Outsourced DecryptionJunzuo Lai ; Deng, Robert H. ; Chaowen Guan ; Jian WengIEEE transactions on information forensics and security, 2013-08, Vol.8 (8), p.1343-1354 [Periódico revisado por pares]New York, NY: IEEETexto completo disponível |
4 |
Material Type: Artigo
|
![]() |
New Framework for Reversible Data Hiding in Encrypted DomainHuang, Fangjun ; Huang, Jiwu ; Shi, Yun-QingIEEE transactions on information forensics and security, 2016-12, Vol.11 (12), p.2777-2789 [Periódico revisado por pares]New York: IEEETexto completo disponível |
5 |
Material Type: Artigo
|
![]() |
Separable Reversible Data Hiding in Encrypted ImageZhang, XinpengIEEE transactions on information forensics and security, 2012-04, Vol.7 (2), p.826-832 [Periódico revisado por pares]New York: IEEETexto completo disponível |
6 |
Material Type: Artigo
|
![]() |
Reversible Data Hiding in Encrypted Images by Reserving Room Before EncryptionMa, Kede ; Weiming Zhang ; Xianfeng Zhao ; Nenghai Yu ; Fenghua LiIEEE transactions on information forensics and security, 2013-03, Vol.8 (3), p.553-562 [Periódico revisado por pares]New York, NY: IEEETexto completo disponível |
7 |
Material Type: Artigo
|
![]() |
Efficient Public Key Encryption With Equality Test Supporting Flexible AuthorizationMa, Sha ; Huang, Qiong ; Zhang, Mingwu ; Yang, BoIEEE transactions on information forensics and security, 2015-03, Vol.10 (3), p.458-470 [Periódico revisado por pares]New York: IEEETexto completo disponível |
8 |
Material Type: Artigo
|
![]() |
Smart and Practical Privacy-Preserving Data Aggregation for Fog-Based Smart GridsZhao, Shuai ; Li, Fenghua ; Li, Hongwei ; Lu, Rongxing ; Ren, Siqi ; Bao, Haiyong ; Lin, Jian-Hong ; Han, SongIEEE transactions on information forensics and security, 2021, Vol.16, p.521-536 [Periódico revisado por pares]IEEETexto completo disponível |
9 |
Material Type: Artigo
|
![]() |
Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced DataFu, Zhangjie ; Huang, Fengxiao ; Ren, Kui ; Weng, Jian ; Wang, CongIEEE transactions on information forensics and security, 2017-08, Vol.12 (8), p.1874-1884 [Periódico revisado por pares]New York: IEEETexto completo disponível |
10 |
Material Type: Artigo
|
![]() |
Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy ImprovementFu, Zhangjie ; Wu, Xinle ; Guan, Chaowen ; Sun, Xingming ; Ren, KuiIEEE transactions on information forensics and security, 2016-12, Vol.11 (12), p.2706-2716 [Periódico revisado por pares]New York: IEEETexto completo disponível |