Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
11 |
Material Type: Artigo
|
![]() |
Reversible Data Hiding in Encrypted Images With Distributed Source EncodingQian, Zhenxing ; Zhang, XinpengIEEE transactions on circuits and systems for video technology, 2016-04, Vol.26 (4), p.636-646 [Periódico revisado por pares]New York: IEEETexto completo disponível |
12 |
Material Type: Artigo
|
![]() |
Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud EmailXu, Peng ; Jiao, Tengfei ; Wu, Qianhong ; Wang, Wei ; Jin, HaiIEEE transactions on computers, 2016-01, Vol.65 (1), p.66-79 [Periódico revisado por pares]IEEETexto completo disponível |
13 |
Material Type: Artigo
|
![]() |
An overview of encryption algorithms in color imagesGhadirli, Hossein Movafegh ; Nodehi, Ali ; Enayatifar, RasulSignal processing, 2019-11, Vol.164, p.163-185 [Periódico revisado por pares]Elsevier B.VTexto completo disponível |
14 |
Material Type: Artigo
|
![]() |
A novel bit-level image encryption algorithm based on 2D-LICM hyperchaotic mapCao, Chun ; Sun, Kehui ; Liu, WenhaoSignal processing, 2018-02, Vol.143, p.122-133 [Periódico revisado por pares]Elsevier B.VTexto completo disponível |
15 |
Material Type: Artigo
|
![]() |
Backward Compatible Identity-Based EncryptionKim, JongkilSensors (Basel, Switzerland), 2023-04, Vol.23 (9), p.4181 [Periódico revisado por pares]Switzerland: MDPI AGTexto completo disponível |
16 |
Material Type: Artigo
|
![]() |
Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing AttackXu, Peng ; Jin, Hai ; Wu, Qianhong ; Wang, WeiIEEE transactions on computers, 2013-11, Vol.62 (11), p.2266-2277 [Periódico revisado por pares]IEEETexto completo disponível |
17 |
Material Type: Artigo
|
![]() |
Anonymous Multireceiver Identity-Based EncryptionFan, Chun-I ; Huang, Ling-Ying ; Ho, Pei-HsiuIEEE transactions on computers, 2010-09, Vol.59 (9), p.1239-1249 [Periódico revisado por pares]New York: IEEETexto completo disponível |
18 |
Material Type: Artigo
|
![]() |
Efficient Public Key Encryption With Equality Test Supporting Flexible AuthorizationMa, Sha ; Huang, Qiong ; Zhang, Mingwu ; Yang, BoIEEE transactions on information forensics and security, 2015-03, Vol.10 (3), p.458-470 [Periódico revisado por pares]New York: IEEETexto completo disponível |
19 |
Material Type: Artigo
|
![]() |
An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud ComputingShulan Wang ; Junwei Zhou ; Liu, Joseph K. ; Jianping Yu ; Jianyong Chen ; Weixin XieIEEE transactions on information forensics and security, 2016-06, Vol.11 (6), p.1265-1277 [Periódico revisado por pares]New York: IEEETexto completo disponível |
20 |
Material Type: Artigo
|
![]() |
Certificateless Searchable Public Key Encryption Scheme for Industrial Internet of ThingsMa, Mimi ; He, Debiao ; Kumar, Neeraj ; Choo, Kim-Kwang Raymond ; Chen, JianhuaIEEE transactions on industrial informatics, 2018-02, Vol.14 (2), p.759-767Piscataway: IEEETexto completo disponível |