skip to main content
Resultados 1 2 3 4 5 next page
Refinado por: tipo de recurso: Artigos remover
Result Number Material Type Add to My Shelf Action Record Details and Options
1
A Survey on Homomorphic Encryption Schemes: Theory and Implementation
Material Type:
Artigo
Adicionar ao Meu Espaço

A Survey on Homomorphic Encryption Schemes: Theory and Implementation

Acar, Abbas ; Aksu, Hidayet ; Uluagac, A. Selcuk ; Conti, Mauro

ACM computing surveys, 2019-09, Vol.51 (4), p.1-35 [Periódico revisado por pares]

Baltimore: Association for Computing Machinery

Texto completo disponível

2
Material Type:
Artigo de Congresso
Adicionar ao Meu Espaço

Nonlinear parity circuits and their cryptographic applications

Kenji Koyama Routo Terada; Conference on the Theory and Application of Cryptography - CRYPTO (1990 Santa Barbara, CA)

Proceedings Berlin : Springer, 1991

Berlin Springer 1991

Localização: IME - Inst. Matemática e Estatística    (PROD-824404 ) e outros locais(Acessar)

3
Revocable Attribute-Based Encryption With Data Integrity in Clouds
Material Type:
Artigo
Adicionar ao Meu Espaço

Revocable Attribute-Based Encryption With Data Integrity in Clouds

Ge, Chunpeng ; Susilo, Willy ; Baek, Joonsang ; Liu, Zhe ; Xia, Jinyue ; Fang, Liming

IEEE transactions on dependable and secure computing, 2022-09, Vol.19 (5), p.2864-2872

Washington: IEEE

Texto completo disponível

4
Searchable Symmetric Encryption with Forward Search Privacy
Material Type:
Artigo
Adicionar ao Meu Espaço

Searchable Symmetric Encryption with Forward Search Privacy

Li, Jin ; Huang, Yanyu ; Wei, Yu ; Lv, Siyi ; Liu, Zheli ; Dong, Changyu ; Lou, Wenjing

IEEE transactions on dependable and secure computing, 2021-01, Vol.18 (1), p.460-474

Washington: IEEE

Texto completo disponível

5
Impulsive Synchronization of Unbounded Delayed Inertial Neural Networks With Actuator Saturation and Sampled-Data Control and its Application to Image Encryption
Material Type:
Artigo
Adicionar ao Meu Espaço

Impulsive Synchronization of Unbounded Delayed Inertial Neural Networks With Actuator Saturation and Sampled-Data Control and its Application to Image Encryption

Li, Hongfei ; Li, Chuandong ; Ouyang, Deqiang ; Nguang, Sing Kiong

IEEE transaction on neural networks and learning systems, 2021-04, Vol.32 (4), p.1460-1473

United States: IEEE

Texto completo disponível

6
Searchable Encryption over Feature-Rich Data
Material Type:
Artigo
Adicionar ao Meu Espaço

Searchable Encryption over Feature-Rich Data

Wang, Qian ; He, Meiqi ; Du, Minxin ; Chow, Sherman S. M. ; Lai, Russell W. F. ; Zou, Qin

IEEE transactions on dependable and secure computing, 2018-05, Vol.15 (3), p.496-510

Washington: IEEE

Texto completo disponível

7
Revocable Identity-Based Broadcast Proxy Re-Encryption for Data Sharing in Clouds
Material Type:
Artigo
Adicionar ao Meu Espaço

Revocable Identity-Based Broadcast Proxy Re-Encryption for Data Sharing in Clouds

Ge, Chunpeng ; Liu, Zhe ; Xia, Jinyue ; Fang, Liming

IEEE transactions on dependable and secure computing, 2021-05, Vol.18 (3), p.1214-1226

Washington: IEEE

Texto completo disponível

8
Attribute Based Encryption with Privacy Protection and Accountability for CloudIoT
Material Type:
Artigo
Adicionar ao Meu Espaço

Attribute Based Encryption with Privacy Protection and Accountability for CloudIoT

Li, Jiguo ; Zhang, Yichen ; Ning, Jianting ; Huang, Xinyi ; Poh, Geong Sen ; Wang, Debang

IEEE transactions on cloud computing, 2022-04, Vol.10 (2), p.762-773 [Periódico revisado por pares]

Piscataway: IEEE

Texto completo disponível

9
A Traceable and Revocable Ciphertext-Policy Attribute-based Encryption Scheme Based on Privacy Protection
Material Type:
Artigo
Adicionar ao Meu Espaço

A Traceable and Revocable Ciphertext-Policy Attribute-based Encryption Scheme Based on Privacy Protection

Han, Dezhi ; Pan, Nannan ; Li, Kuan-Ching

IEEE transactions on dependable and secure computing, 2022-01, Vol.19 (1), p.316-327

Washington: IEEE

Texto completo disponível

10
Dynamic Fully Homomorphic encryption-based Merkle Tree for lightweight streaming authenticated data structures
Material Type:
Artigo
Adicionar ao Meu Espaço

Dynamic Fully Homomorphic encryption-based Merkle Tree for lightweight streaming authenticated data structures

Xu, Jian ; Wei, Laiwen ; Zhang, Yu ; Wang, Andi ; Zhou, Fucai ; Gao, Chong-zhi

Journal of network and computer applications, 2018-04, Vol.107, p.113-124 [Periódico revisado por pares]

Elsevier Ltd

Texto completo disponível

Resultados 1 2 3 4 5 next page

Personalize Seus Resultados

  1. Editar

Refine Search Results

Expandir Meus Resultados

  1.   

Mostrar Somente

  1. Recursos Online (101.397)
  2. Revistas revisadas por pares (74.848)
  3. Disponível na Biblioteca (1)

Refinar Meus Resultados

Assunto 

  1. Science & Technology  (61.926)
  2. Technology  (51.424)
  3. Computer Science  (39.403)
  4. Engineering  (26.375)
  5. Computer Science, Information Systems  (23.587)
  6. Algorithms  (22.924)
  7. Cryptography  (18.690)
  8. Encryption  (18.490)
  9. Engineering, Electrical & Electronic  (17.897)
  10. Security  (14.754)
  11. Privacy  (14.151)
  12. Physical Sciences  (13.623)
  13. Telecommunications  (13.251)
  14. Computer Science, Theory & Methods  (11.284)
  15. Data Encryption  (11.127)
  16. Cybersecurity  (10.553)
  17. Internet Of Things  (9.397)
  18. Software  (9.332)
  19. Cloud Computing  (9.027)
  20. Internet  (7.793)
  21. Criptologia  (1)
  22. Mais opções open sub menu

Data de Publicação 

De até
  1. Antes de1984  (133)
  2. 1984Até1993  (885)
  3. 1994Até2003  (7.861)
  4. 2004Até2014  (23.255)
  5. Após 2014  (69.262)
  6. Mais opções open sub menu

Idioma 

  1. Inglês  (101.018)
  2. Japonês  (3.064)
  3. Francês  (175)
  4. Português  (172)
  5. Espanhol  (136)
  6. Coreano  (128)
  7. Alemão  (121)
  8. Chinês  (113)
  9. Árabe  (71)
  10. Polonês  (37)
  11. Russo  (23)
  12. Norueguês  (20)
  13. Croatian  (17)
  14. Indonésio  (14)
  15. Lituano  (9)
  16. Tcheco  (8)
  17. Turco  (7)
  18. Africâner  (6)
  19. Romeno  (4)
  20. Italiano  (3)
  21. Mais opções open sub menu

Buscando em bases de dados remotas. Favor aguardar.