Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Artigo
|
![]() |
A Survey on Homomorphic Encryption Schemes: Theory and ImplementationAcar, Abbas ; Aksu, Hidayet ; Uluagac, A. Selcuk ; Conti, MauroACM computing surveys, 2019-09, Vol.51 (4), p.1-35 [Periódico revisado por pares]Baltimore: Association for Computing MachineryTexto completo disponível |
2 |
Material Type: Artigo
|
![]() |
Impulsive Synchronization of Unbounded Delayed Inertial Neural Networks With Actuator Saturation and Sampled-Data Control and its Application to Image EncryptionLi, Hongfei ; Li, Chuandong ; Ouyang, Deqiang ; Nguang, Sing KiongIEEE transaction on neural networks and learning systems, 2021-04, Vol.32 (4), p.1460-1473United States: IEEETexto completo disponível |
3 |
Material Type: Livro
|
![]() |
Homomorphic Signature Schemes: A SurveyTraverso, Giulia ; Demirel, Denise ; Buchmann, JohannesCham: Springer International Publishing AG 2016Texto completo disponível |
4 |
Material Type: Livro
|
![]() |
Identity-Based EncryptionSarkar, Palash ; Chatterjee, SanjitNew York, NY: Springer Science + Business Media 2011Texto completo disponível |
5 |
Material Type: Artigo
|
![]() |
Attribute Based Encryption with Privacy Protection and Accountability for CloudIoTLi, Jiguo ; Zhang, Yichen ; Ning, Jianting ; Huang, Xinyi ; Poh, Geong Sen ; Wang, DebangIEEE transactions on cloud computing, 2022-04, Vol.10 (2), p.762-773 [Periódico revisado por pares]Piscataway: IEEETexto completo disponível |
6 |
Material Type: Artigo
|
![]() |
A resource-efficient encryption algorithm for multimedia big dataAljawarneh, Shadi ; Yassein, Muneer Bani ; Talafha, We’am AdelMultimedia tools and applications, 2017-11, Vol.76 (21), p.22703-22724 [Periódico revisado por pares]New York: Springer USTexto completo disponível |
7 |
Material Type: Ata de Congresso
|
![]() |
Leakage-Abuse Attacks Against Searchable EncryptionCash, David ; Grubbs, Paul ; Perry, Jason ; Ristenpart, ThomasProceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015, p.668-679New York, NY, USA: ACMTexto completo disponível |
8 |
Material Type: Artigo
|
![]() |
Selective encryption on ECG data in body sensor network based on supervised machine learningQiu, Han ; Qiu, Meikang ; Lu, ZhihuiInformation fusion, 2020-03, Vol.55, p.59-67 [Periódico revisado por pares]Elsevier B.VTexto completo disponível |
9 |
Material Type: Artigo
|
![]() |
Achieving Secure and Efficient Dynamic Searchable Symmetric Encryption over Medical Cloud DataLi, Hongwei ; Yang, Yi ; Dai, Yuanshun ; Yu, Shui ; Xiang, YongIEEE transactions on cloud computing, 2020-04, Vol.8 (2), p.484-494 [Periódico revisado por pares]Piscataway: IEEE Computer SocietyTexto completo disponível |
10 |
Material Type: Artigo
|
![]() |
Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applicationsThakur, Sriti ; Singh, Amit Kumar ; Ghrera, Satya Prakash ; Elhoseny, MohamedMultimedia tools and applications, 2019-02, Vol.78 (3), p.3457-3470 [Periódico revisado por pares]New York: Springer USTexto completo disponível |