Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Artigo
|
![]() |
A Survey on Homomorphic Encryption Schemes: Theory and ImplementationAcar, Abbas ; Aksu, Hidayet ; Uluagac, A. Selcuk ; Conti, MauroACM computing surveys, 2019-09, Vol.51 (4), p.1-35 [Periódico revisado por pares]Baltimore: Association for Computing MachineryTexto completo disponível |
2 |
Material Type: Artigo
|
![]() |
On the (Im)possibility of Obfuscating ProgramsBARAK, Boaz ; GOLDREICH, Oded ; IMPAGLIAZZO, Russell ; RUDICH, Steven ; SAHAI, Amit ; VADHAN, Salil ; KE YANGJournal of the ACM, 2012-04, Vol.59 (2), p.1-48 [Periódico revisado por pares]New York, NY: Association for Computing MachineryTexto completo disponível |
3 |
Material Type: Artigo
|
![]() |
Secure Keyword Search and Data Sharing Mechanism for Cloud ComputingGe, Chunpeng ; Susilo, Willy ; Liu, Zhe ; Xia, Jinyue ; Szalachowski, Pawel ; Fang, LimingIEEE transactions on dependable and secure computing, 2021-11, Vol.18 (6), p.2787-2800Washington: IEEETexto completo disponível |
4 |
Material Type: Artigo
|
![]() |
Impulsive Synchronization of Unbounded Delayed Inertial Neural Networks With Actuator Saturation and Sampled-Data Control and its Application to Image EncryptionLi, Hongfei ; Li, Chuandong ; Ouyang, Deqiang ; Nguang, Sing KiongIEEE transaction on neural networks and learning systems, 2021-04, Vol.32 (4), p.1460-1473United States: IEEETexto completo disponível |
5 |
Material Type: Artigo
|
![]() |
Revocable Identity-Based Broadcast Proxy Re-Encryption for Data Sharing in CloudsGe, Chunpeng ; Liu, Zhe ; Xia, Jinyue ; Fang, LimingIEEE transactions on dependable and secure computing, 2021-05, Vol.18 (3), p.1214-1226Washington: IEEETexto completo disponível |
6 |
Material Type: Artigo
|
![]() |
Searchable Symmetric Encryption with Forward Search PrivacyLi, Jin ; Huang, Yanyu ; Wei, Yu ; Lv, Siyi ; Liu, Zheli ; Dong, Changyu ; Lou, WenjingIEEE transactions on dependable and secure computing, 2021-01, Vol.18 (1), p.460-474Washington: IEEETexto completo disponível |
7 |
Material Type: Artigo
|
![]() |
Color image chaos encryption algorithm combining CRC and nine palace mapXiong, Zenggang ; Wu, Yuan ; Ye, Conghuan ; Zhang, Xuemin ; Xu, FangMultimedia tools and applications, 2019-11, Vol.78 (22), p.31035-31055 [Periódico revisado por pares]New York: Springer USTexto completo disponível |
8 |
Material Type: Artigo
|
![]() |
A chaotic image encryption algorithm based on 3-D bit-plane permutationGan, Zhi-hua ; Chai, Xiu-li ; Han, Dao-jun ; Chen, Yi-ranNeural computing & applications, 2019-11, Vol.31 (11), p.7111-7130 [Periódico revisado por pares]London: Springer LondonTexto completo disponível |
9 |
Material Type: Artigo
|
![]() |
Synchronization of an Inertial Neural Network With Time-Varying Delays and Its Application to Secure CommunicationLakshmanan, Shanmugam ; Prakash, Mani ; Chee Peng Lim ; Rakkiyappan, Rajan ; Balasubramaniam, Pagavathigounder ; Nahavandi, SaeidIEEE transaction on neural networks and learning systems, 2018-01, Vol.29 (1), p.195-207United States: IEEETexto completo disponível |
10 |
Material Type: Artigo
|
![]() |
A novel chaotic image encryption algorithm based on improved baker map and logistic mapLuo, Yuqin ; Yu, Jin ; Lai, Wenrui ; Liu, LingfengMultimedia tools and applications, 2019-08, Vol.78 (15), p.22023-22043 [Periódico revisado por pares]New York: Springer USTexto completo disponível |