Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Article
|
![]() |
A Survey on Homomorphic Encryption Schemes: Theory and ImplementationAcar, Abbas ; Aksu, Hidayet ; Uluagac, A. Selcuk ; Conti, MauroACM computing surveys, 2019-09, Vol.51 (4), p.1-35 [Peer Reviewed Journal]Baltimore: Association for Computing MachineryFull text available |
2 |
Material Type: Article
|
![]() |
On the (Im)possibility of Obfuscating ProgramsBARAK, Boaz ; GOLDREICH, Oded ; IMPAGLIAZZO, Russell ; RUDICH, Steven ; SAHAI, Amit ; VADHAN, Salil ; KE YANGJournal of the ACM, 2012-04, Vol.59 (2), p.1-48 [Peer Reviewed Journal]New York, NY: Association for Computing MachineryFull text available |
3 |
Material Type: Book
|
![]() |
Data and Applications Security and Privacy XXXII: 32nd Annual IFIP WG 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16-18, 2018, ProceedingsKerschbaum, Florian ; Paraboschi, Stefano Paraboschi, Stefano ; Kerschbaum, Florian ; Kerschbaum, Florian ; Paraboschi, StefanoNetherlands: Springer Nature 2018No full-text |
4 |
Material Type: Book
|
![]() |
Securing Wireless Communications at the Physical LayerLiu, Ruoheng ; Trappe, Wade Trappe, Wade ; Liu, RuohengNew York, NY: Springer-Verlag 2010No full-text |
5 |
Material Type: Book
|
![]() |
Detection of Intrusions and Malware, and Vulnerability Assessment: 17th International Conference, DIMVA 2020, Lisbon, Portugal, June 24-26, 2020, ProceedingsMaurice, Clémentine ; Bilge, Leyla ; Stringhini, Gianluca ; Neves, Nuno Neves, Nuno ; Stringhini, Gianluca ; Maurice, Clémentine ; Bilge, Leyla ; Stringhini, Gianluca ; Bilge, Leyla ; Neves, Nuno ; Maurice, ClémentineCham: Springer Nature 2020No full-text |
6 |
Material Type: Article
|
![]() |
Color image chaos encryption algorithm combining CRC and nine palace mapXiong, Zenggang ; Wu, Yuan ; Ye, Conghuan ; Zhang, Xuemin ; Xu, FangMultimedia tools and applications, 2019-11, Vol.78 (22), p.31035-31055 [Peer Reviewed Journal]New York: Springer USFull text available |
7 |
Material Type: Article
|
![]() |
A chaotic image encryption algorithm based on 3-D bit-plane permutationGan, Zhi-hua ; Chai, Xiu-li ; Han, Dao-jun ; Chen, Yi-ranNeural computing & applications, 2019-11, Vol.31 (11), p.7111-7130 [Peer Reviewed Journal]London: Springer LondonFull text available |
8 |
Material Type: Article
|
![]() |
Synchronization of an Inertial Neural Network With Time-Varying Delays and Its Application to Secure CommunicationLakshmanan, Shanmugam ; Prakash, Mani ; Chee Peng Lim ; Rakkiyappan, Rajan ; Balasubramaniam, Pagavathigounder ; Nahavandi, SaeidIEEE transaction on neural networks and learning systems, 2018-01, Vol.29 (1), p.195-207United States: IEEEFull text available |
9 |
Material Type: Article
|
![]() |
A novel chaotic image encryption algorithm based on improved baker map and logistic mapLuo, Yuqin ; Yu, Jin ; Lai, Wenrui ; Liu, LingfengMultimedia tools and applications, 2019-08, Vol.78 (15), p.22023-22043 [Peer Reviewed Journal]New York: Springer USFull text available |
10 |
Material Type: Article
|
![]() |
PHOABE: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoTBelguith, Sana ; Kaaniche, Nesrine ; Laurent, Maryline ; Jemai, Abderrazak ; Attia, RabahComputer networks (Amsterdam, Netherlands : 1999), 2018-03, Vol.133, p.141-156 [Peer Reviewed Journal]Amsterdam: Elsevier B.VFull text available |