skip to main content
Mostrar Somente
Refinado por: assunto: Encryption remover xxx: xxx remover
Result Number Material Type Add to My Shelf Action Record Details and Options
1
Utilization of secret sharing technology for secure communication: a state-of-the-art review
Material Type:
Artigo
Adicionar ao Meu Espaço

Utilization of secret sharing technology for secure communication: a state-of-the-art review

Sarosh, Parsa ; Parah, Shabir A. ; Bhat, G. M.

Multimedia tools and applications, 2021, Vol.80 (1), p.517-541 [Periódico revisado por pares]

New York: Springer US

Texto completo disponível

2
Exploiting 2D compressed sensing and information entropy for secure color image compression and encryption
Material Type:
Artigo
Adicionar ao Meu Espaço

Exploiting 2D compressed sensing and information entropy for secure color image compression and encryption

Gan, Zhihua ; Bi, Jianqiang ; Ding, Wenke ; Chai, Xiuli

Neural computing & applications, 2021-10, Vol.33 (19), p.12845-12867 [Periódico revisado por pares]

London: Springer London

Texto completo disponível

3
Stream cipher designs: a review
Material Type:
Artigo
Adicionar ao Meu Espaço

Stream cipher designs: a review

Jiao, Lin ; Hao, Yonglin ; Feng, Dengguo

Science China. Information sciences, 2020-03, Vol.63 (3), p.131101, Article 131101 [Periódico revisado por pares]

Beijing: Science China Press

Texto completo disponível

4
Fault Attacks on the Authenticated Encryption Stream Cipher MORUS
Material Type:
Artigo
Adicionar ao Meu Espaço

Fault Attacks on the Authenticated Encryption Stream Cipher MORUS

Salam, Iftekhar ; Simpson, Leonie ; Bartlett, Harry ; Dawson, Ed ; Koon-Ho Wong, Kenneth

Cryptography, 2018-03, Vol.2 (1), p.4 [Periódico revisado por pares]

Basel: MDPI AG

Texto completo disponível

5
RESeED: A secure regular‐expression search tool for storage clouds
Material Type:
Artigo
Adicionar ao Meu Espaço

RESeED: A secure regular‐expression search tool for storage clouds

Salehi, Mohsen Amini ; Caldwell, Thomas ; Fernandez, Alejandro ; Mickiewicz, Emmanuel ; Rozier, Eric W. D. ; Zonouz, Saman ; Redberg, David

Software, practice & experience, 2017-09, Vol.47 (9), p.1221-1241 [Periódico revisado por pares]

Chichester, UK: John Wiley & Sons, Ltd

Texto completo disponível

6
Enhancing Data Security: A Cutting-Edge Approach Utilizing Protein Chains in Cryptography and Steganography
Material Type:
Artigo
Adicionar ao Meu Espaço

Enhancing Data Security: A Cutting-Edge Approach Utilizing Protein Chains in Cryptography and Steganography

Mawla, Noura A. ; Khafaji, Hussein K.

Computers (Basel), 2023-08, Vol.12 (8), p.166 [Periódico revisado por pares]

Basel: MDPI AG

Texto completo disponível

7
Data Distribution for Multiple Receivers in a Connected Car Environment Using 5G Communication
Material Type:
Artigo
Adicionar ao Meu Espaço

Data Distribution for Multiple Receivers in a Connected Car Environment Using 5G Communication

Kim, Won-Bin ; Seo, Daehee ; Kim, Donghyun ; Lee, Im-Yeong Wang, Jinwei ; Jinwei Wang

Security and communication networks, 2021, Vol.2021, p.1-14 [Periódico revisado por pares]

London: Hindawi

Texto completo disponível

8
Biclique cryptanalysis on Midori block cipher
Material Type:
Artigo
Adicionar ao Meu Espaço

Biclique cryptanalysis on Midori block cipher

Zhao, Hongluan ; Han, Guoyong

International journal of embedded systems, 2019, Vol.11 (2), p.229-239

Geneva: Inderscience Publishers (IEL)

Sem texto completo

9
A Robust Watermarking Scheme Based on ROI and IWT for Remote Consultation of COVID-19
Material Type:
Artigo
Adicionar ao Meu Espaço

A Robust Watermarking Scheme Based on ROI and IWT for Remote Consultation of COVID-19

Zhang, Xiaorui ; Zhang, Wenfang ; Sun, Wei ; Xu, Tong ; Kumar Jha, Sunil

Computers, materials & continua, 2020-01, Vol.64 (3), p.1435-1452

Henderson: Tech Science Press

Texto completo disponível

10
Applying Spring Security Framework with KeyCloak-Based OAuth2 to Protect Microservice Architecture APIs: A Case Study
Material Type:
Artigo
Adicionar ao Meu Espaço

Applying Spring Security Framework with KeyCloak-Based OAuth2 to Protect Microservice Architecture APIs: A Case Study

Chatterjee, Ayan ; Prinz, Andreas

Sensors (Basel, Switzerland), 2022-02, Vol.22 (5), p.1703 [Periódico revisado por pares]

Switzerland: MDPI AG

Texto completo disponível

Personalize Seus Resultados

  1. Editar

Refine Search Results

Expandir Meus Resultados

  1.   

Mostrar Somente

  1. Recursos Online (11)
  2. Revistas revisadas por pares (11)

Data de Publicação 

De até
  1. Antes de2015  (1)
  2. 2015Até2016  (1)
  3. 2017Até2017  (1)
  4. 2018Até2019  (2)
  5. Após 2019  (9)
  6. Mais opções open sub menu

Buscando em bases de dados remotas. Favor aguardar.