skip to main content
Results 1 2 3 4 5 next page
Show only
Refined by: subject: Data Encryption remove subject: Science & Technology remove
Result Number Material Type Add to My Shelf Action Record Details and Options
1
A Survey on Homomorphic Encryption Schemes: Theory and Implementation
Material Type:
Article
Add to e-Shelf

A Survey on Homomorphic Encryption Schemes: Theory and Implementation

Acar, Abbas ; Aksu, Hidayet ; Uluagac, A. Selcuk ; Conti, Mauro

ACM computing surveys, 2019-09, Vol.51 (4), p.1-35 [Peer Reviewed Journal]

Baltimore: Association for Computing Machinery

Full text available

2
On the (Im)possibility of Obfuscating Programs
Material Type:
Article
Add to e-Shelf

On the (Im)possibility of Obfuscating Programs

BARAK, Boaz ; GOLDREICH, Oded ; IMPAGLIAZZO, Russell ; RUDICH, Steven ; SAHAI, Amit ; VADHAN, Salil ; KE YANG

Journal of the ACM, 2012-04, Vol.59 (2), p.1-48 [Peer Reviewed Journal]

New York, NY: Association for Computing Machinery

Full text available

3
Data and Applications Security and Privacy XXXII: 32nd Annual IFIP WG 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16-18, 2018, Proceedings
Material Type:
Book
Add to e-Shelf

Data and Applications Security and Privacy XXXII: 32nd Annual IFIP WG 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16-18, 2018, Proceedings

Kerschbaum, Florian ; Paraboschi, Stefano Paraboschi, Stefano ; Kerschbaum, Florian ; Kerschbaum, Florian ; Paraboschi, Stefano

Netherlands: Springer Nature 2018

No full-text

4
Securing Wireless Communications at the Physical Layer
Material Type:
Book
Add to e-Shelf

Securing Wireless Communications at the Physical Layer

Liu, Ruoheng ; Trappe, Wade Trappe, Wade ; Liu, Ruoheng

New York, NY: Springer-Verlag 2010

No full-text

5
Detection of Intrusions and Malware, and Vulnerability Assessment: 17th International Conference, DIMVA 2020, Lisbon, Portugal, June 24-26, 2020, Proceedings
Material Type:
Book
Add to e-Shelf

Detection of Intrusions and Malware, and Vulnerability Assessment: 17th International Conference, DIMVA 2020, Lisbon, Portugal, June 24-26, 2020, Proceedings

Maurice, Clémentine ; Bilge, Leyla ; Stringhini, Gianluca ; Neves, Nuno Neves, Nuno ; Stringhini, Gianluca ; Maurice, Clémentine ; Bilge, Leyla ; Stringhini, Gianluca ; Bilge, Leyla ; Neves, Nuno ; Maurice, Clémentine

Cham: Springer Nature 2020

No full-text

6
Color image chaos encryption algorithm combining CRC and nine palace map
Material Type:
Article
Add to e-Shelf

Color image chaos encryption algorithm combining CRC and nine palace map

Xiong, Zenggang ; Wu, Yuan ; Ye, Conghuan ; Zhang, Xuemin ; Xu, Fang

Multimedia tools and applications, 2019-11, Vol.78 (22), p.31035-31055 [Peer Reviewed Journal]

New York: Springer US

Full text available

7
A chaotic image encryption algorithm based on 3-D bit-plane permutation
Material Type:
Article
Add to e-Shelf

A chaotic image encryption algorithm based on 3-D bit-plane permutation

Gan, Zhi-hua ; Chai, Xiu-li ; Han, Dao-jun ; Chen, Yi-ran

Neural computing & applications, 2019-11, Vol.31 (11), p.7111-7130 [Peer Reviewed Journal]

London: Springer London

Full text available

8
Synchronization of an Inertial Neural Network With Time-Varying Delays and Its Application to Secure Communication
Material Type:
Article
Add to e-Shelf

Synchronization of an Inertial Neural Network With Time-Varying Delays and Its Application to Secure Communication

Lakshmanan, Shanmugam ; Prakash, Mani ; Chee Peng Lim ; Rakkiyappan, Rajan ; Balasubramaniam, Pagavathigounder ; Nahavandi, Saeid

IEEE transaction on neural networks and learning systems, 2018-01, Vol.29 (1), p.195-207

United States: IEEE

Full text available

9
A novel chaotic image encryption algorithm based on improved baker map and logistic map
Material Type:
Article
Add to e-Shelf

A novel chaotic image encryption algorithm based on improved baker map and logistic map

Luo, Yuqin ; Yu, Jin ; Lai, Wenrui ; Liu, Lingfeng

Multimedia tools and applications, 2019-08, Vol.78 (15), p.22023-22043 [Peer Reviewed Journal]

New York: Springer US

Full text available

10
PHOABE: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT
Material Type:
Article
Add to e-Shelf

PHOABE: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT

Belguith, Sana ; Kaaniche, Nesrine ; Laurent, Maryline ; Jemai, Abderrazak ; Attia, Rabah

Computer networks (Amsterdam, Netherlands : 1999), 2018-03, Vol.133, p.141-156 [Peer Reviewed Journal]

Amsterdam: Elsevier B.V

Full text available

Results 1 2 3 4 5 next page

Personalize your results

  1. Edit

Refine Search Results

Expand My Results

  1.   

Show only

  1. Full Text Online (5,633)
  2. Peer-reviewed Journals (5,050)

Refine My Results

Resource Type 

  1. Articles  (5,006)
  2. Book Chapters  (462)
  3. magazinearticle  (259)
  4. Conference Proceedings  (166)
  5. Books  (129)
  6. Reviews  (3)
  7. More options open sub menu

Creation Date 

From To
  1. Before1983  (18)
  2. 1983To1992  (60)
  3. 1993To2002  (404)
  4. 2003To2013  (1,264)
  5. After 2013  (4,449)
  6. More options open sub menu

Language 

  1. Japanese  (309)
  2. German  (18)
  3. French  (10)
  4. Korean  (6)
  5. Portuguese  (4)
  6. Arabic  (3)
  7. Spanish  (2)
  8. Catalan  (1)
  9. Chinese  (1)
  10. Croatian  (1)
  11. More options open sub menu

Searching Remote Databases, Please Wait

  • Searching for
  • inscope:(USP_VIDEOS),scope:("PRIMO"),scope:(USP_FISICO),scope:(USP_EREVISTAS),scope:(USP),scope:(USP_EBOOKS),scope:(USP_PRODUCAO),primo_central_multiple_fe
  • Show me what you have so far