skip to main content
Mostrar Somente
Refinado por: assunto: Engineering remover xxx: xxx remover
Result Number Material Type Add to My Shelf Action Record Details and Options
1
A self-embedding technique for tamper detection and localization of medical images for smart-health
Material Type:
Artigo
Adicionar ao Meu Espaço

A self-embedding technique for tamper detection and localization of medical images for smart-health

Gull, Solihah ; Mansour, Romany F. ; Aljehane, Nojood O. ; Parah, Shabir A.

Multimedia tools and applications, 2021-08, Vol.80 (19), p.29939-29964 [Periódico revisado por pares]

New York: Springer US

Texto completo disponível

2
Utilization of secret sharing technology for secure communication: a state-of-the-art review
Material Type:
Artigo
Adicionar ao Meu Espaço

Utilization of secret sharing technology for secure communication: a state-of-the-art review

Sarosh, Parsa ; Parah, Shabir A. ; Bhat, G. M.

Multimedia tools and applications, 2021, Vol.80 (1), p.517-541 [Periódico revisado por pares]

New York: Springer US

Texto completo disponível

3
Applying Spring Security Framework with KeyCloak-Based OAuth2 to Protect Microservice Architecture APIs: A Case Study
Material Type:
Artigo
Adicionar ao Meu Espaço

Applying Spring Security Framework with KeyCloak-Based OAuth2 to Protect Microservice Architecture APIs: A Case Study

Chatterjee, Ayan ; Prinz, Andreas

Sensors (Basel, Switzerland), 2022-02, Vol.22 (5), p.1703 [Periódico revisado por pares]

Switzerland: MDPI AG

Texto completo disponível

4
Stream cipher designs: a review
Material Type:
Artigo
Adicionar ao Meu Espaço

Stream cipher designs: a review

Jiao, Lin ; Hao, Yonglin ; Feng, Dengguo

Science China. Information sciences, 2020-03, Vol.63 (3), p.131101, Article 131101 [Periódico revisado por pares]

Beijing: Science China Press

Texto completo disponível

5
Sharing secured data on peer-to-peer applications using attribute-based encryption
Material Type:
Artigo
Adicionar ao Meu Espaço

Sharing secured data on peer-to-peer applications using attribute-based encryption

Dang, Nhan Tam ; Tran, Ha Manh ; Nguyen, Sinh Van ; Maleszka, Marcin ; Le, Hai-Duong

Journal of information and telecommunication (Print), 2021-10, Vol.5 (4), p.440-459 [Periódico revisado por pares]

Abingdon: Taylor & Francis

Texto completo disponível

6
Design of Digital Image Encryption Algorithm Based On Mixed Chaotic Sequences
Material Type:
Artigo
Adicionar ao Meu Espaço

Design of Digital Image Encryption Algorithm Based On Mixed Chaotic Sequences

Chen, Wenqing ; Wang, Tao ; Wang, Bailing

International journal on smart sensing and intelligent systems, 2014-01, Vol.7 (4), p.1453-1469 [Periódico revisado por pares]

Sydney: Sciendo

Texto completo disponível

7
OMD: A Compression Function Mode of Operation for Authenticated Encryption
Material Type:
Capítulo de Livro
Adicionar ao Meu Espaço

OMD: A Compression Function Mode of Operation for Authenticated Encryption

Cogliani, Simon ; Maimuţ, Diana-Ştefania ; Naccache, David ; do Canto, Rodrigo Portella ; Reyhanitabar, Reza ; Vaudenay, Serge ; Vizár, Damian Youssef, Amr ; Joux, Antoine

Selected Areas in Cryptography -- SAC 2014, 2014, Vol.8781, p.112-128 [Periódico revisado por pares]

Switzerland: Springer International Publishing AG

Texto completo disponível

8
Quantum Neural Network Based Distinguisher on SPECK-32/64
Material Type:
Artigo
Adicionar ao Meu Espaço

Quantum Neural Network Based Distinguisher on SPECK-32/64

Kim, Hyunji ; Jang, Kyungbae ; Lim, Sejin ; Kang, Yeajun ; Kim, Wonwoong ; Seo, Hwajeong

Sensors (Basel, Switzerland), 2023-06, Vol.23 (12), p.5683 [Periódico revisado por pares]

Switzerland: MDPI AG

Texto completo disponível

9
Comprehensive Review: Privacy Protection of User in Location-Aware Services of Mobile Cloud Computing
Material Type:
Artigo
Adicionar ao Meu Espaço

Comprehensive Review: Privacy Protection of User in Location-Aware Services of Mobile Cloud Computing

A. Almusaylim, Zahrah ; Jhanjhi, NZ

Wireless personal communications, 2020-03, Vol.111 (1), p.541-564 [Periódico revisado por pares]

New York: Springer US

Texto completo disponível

10
Technique for Searching Data in a Cryptographically Protected SQL Database
Material Type:
Artigo
Adicionar ao Meu Espaço

Technique for Searching Data in a Cryptographically Protected SQL Database

Yesin, Vitalii ; Karpinski, Mikolaj ; Yesina, Maryna ; Vilihura, Vladyslav ; Kozak, Ruslan ; Shevchuk, Ruslan

Applied sciences, 2023-10, Vol.13 (20), p.11525 [Periódico revisado por pares]

Basel: MDPI AG

Texto completo disponível

Personalize Seus Resultados

  1. Editar

Refine Search Results

Expandir Meus Resultados

  1.   

Mostrar Somente

  1. Revistas revisadas por pares (13)

Refinar Meus Resultados

Tipo de Recurso 

  1. Artigos  (12)
  2. Anais de Congresso  (1)
  3. Book Chapters  (1)
  4. Mais opções open sub menu

Data de Publicação 

De até
  1. Antes de2014  (1)
  2. 2014Até2016  (3)
  3. 2017Até2019  (1)
  4. 2020Até2021  (6)
  5. Após 2021  (4)
  6. Mais opções open sub menu

Buscando em bases de dados remotas. Favor aguardar.