skip to main content
Resultados 1 2 3 4 5 next page
Mostrar Somente
Refinado por: Base de dados/Biblioteca: Wiley Online Library - AutoHoldings Journals remover tipo de recurso: Artigos remover
Result Number Material Type Add to My Shelf Action Record Details and Options
1
Image encryption based on a single‐round dictionary and chaotic sequences in cloud computing
Material Type:
Artigo
Adicionar ao Meu Espaço

Image encryption based on a single‐round dictionary and chaotic sequences in cloud computing

Li, Yinghua ; Yu, He ; Song, Bin ; Chen, Jinjun

Concurrency and computation, 2021-04, Vol.33 (7), p.1-1 [Periódico revisado por pares]

Hoboken: Wiley Subscription Services, Inc

Texto completo disponível

2
An improved attribute‐based encryption technique towards the data security in cloud computing
Material Type:
Artigo
Adicionar ao Meu Espaço

An improved attribute‐based encryption technique towards the data security in cloud computing

Namasudra, Suyel

Concurrency and computation, 2019-02, Vol.31 (3), p.n/a [Periódico revisado por pares]

Hoboken: Wiley Subscription Services, Inc

Texto completo disponível

3
Privacy‐preserving federated learning based on multi‐key homomorphic encryption
Material Type:
Artigo
Adicionar ao Meu Espaço

Privacy‐preserving federated learning based on multi‐key homomorphic encryption

Ma, Jing ; Naas, Si‐Ahmed ; Sigg, Stephan ; Lyu, Xixiang

International journal of intelligent systems, 2022-09, Vol.37 (9), p.5880-5901 [Periódico revisado por pares]

New York: Hindawi Limited

Texto completo disponível

4
Authentication of fog‐assisted IoT networks using Advanced Encryption credibility approach with modified Diffie–Hellman encryption
Material Type:
Artigo
Adicionar ao Meu Espaço

Authentication of fog‐assisted IoT networks using Advanced Encryption credibility approach with modified Diffie–Hellman encryption

Luqman, Mohammad ; Arman Rasool Faridi

Concurrency and computation, 2023-10, Vol.35 (22) [Periódico revisado por pares]

Hoboken: Wiley Subscription Services, Inc

Texto completo disponível

5
Convergent encryption enabled secure data deduplication algorithm for cloud environment
Material Type:
Artigo
Adicionar ao Meu Espaço

Convergent encryption enabled secure data deduplication algorithm for cloud environment

Ahmad, Shahnawaz ; Arif, Mohd ; Ahmad, Javed ; Nazim, Mohd ; Mehfuz, Shabana

Concurrency and computation, 2024-06 [Periódico revisado por pares]

Texto completo disponível

6
A fully homomorphic encryption based on magic number fragmentation and El‐Gamal encryption: Smart healthcare use case
Material Type:
Artigo
Adicionar ao Meu Espaço

A fully homomorphic encryption based on magic number fragmentation and El‐Gamal encryption: Smart healthcare use case

Kara, Mostefa ; Laouid, Abdelkader ; Yagoub, Mohammed Amine ; Euler, Reinhardt ; Medileh, Saci ; Hammoudeh, Mohammad ; Eleyan, Amna ; Bounceur, Ahcène

Expert systems, 2022-06, Vol.39 (5), p.n/a [Periódico revisado por pares]

Oxford: Blackwell Publishing Ltd

Texto completo disponível

7
Enhanced Lorenz-Chaotic Encryption Method for Partial Medical Image Encryption and Data Hiding in Big Data Healthcare
Material Type:
Artigo
Adicionar ao Meu Espaço

Enhanced Lorenz-Chaotic Encryption Method for Partial Medical Image Encryption and Data Hiding in Big Data Healthcare

Rashmi, P. ; Supriya, M. C. ; Hua, Qiaozhi Chakraborty, Chinmay ; Chinmay Chakraborty

Security and communication networks, 2022-02, Vol.2022, p.1-9 [Periódico revisado por pares]

London: Hindawi

Texto completo disponível

8
Flexible privacy‐preserving machine learning: When searchable encryption meets homomorphic encryption
Material Type:
Artigo
Adicionar ao Meu Espaço

Flexible privacy‐preserving machine learning: When searchable encryption meets homomorphic encryption

Jia, Haixin ; Aldeen, Mohammed S. ; Zhao, Chuan ; Jing, Shan ; Chen, Zhenxiang

International journal of intelligent systems, 2022-11, Vol.37 (11), p.9173-9191 [Periódico revisado por pares]

New York: Hindawi Limited

Texto completo disponível

9
Secure third‐party data clustering using SecureCL, Φ‐data and multi‐user order preserving encryption
Material Type:
Artigo
Adicionar ao Meu Espaço

Secure third‐party data clustering using SecureCL, Φ‐data and multi‐user order preserving encryption

Almutairi, Nawal ; Coenen, Frans ; Dures, Keith

Expert systems, 2021-11, Vol.38 (7), p.n/a [Periódico revisado por pares]

Oxford: Blackwell Publishing Ltd

Texto completo disponível

10
Blockchain‐based IoT architecture to secure healthcare system using identity‐based encryption
Material Type:
Artigo
Adicionar ao Meu Espaço

Blockchain‐based IoT architecture to secure healthcare system using identity‐based encryption

Sharma, Pratima ; Moparthi, Nageswara Rao ; Namasudra, Suyel ; Shanmuganathan, Vimal ; Hsu, Ching‐Hsien

Expert systems, 2022-12, Vol.39 (10), p.n/a [Periódico revisado por pares]

Oxford: Blackwell Publishing Ltd

Texto completo disponível

Resultados 1 2 3 4 5 next page

Personalize Seus Resultados

  1. Editar

Refine Search Results

Expandir Meus Resultados

  1.   

Mostrar Somente

  1. Recursos Online (8.292)
  2. Revistas revisadas por pares (8.315)

Data de Publicação 

De até
  1. Antes de1987  (13)
  2. 1987Até1995  (54)
  3. 1996Até2004  (253)
  4. 2005Até2014  (1.319)
  5. Após 2014  (6.866)
  6. Mais opções open sub menu

Idioma 

  1. Japonês  (329)
  2. Alemão  (8)
  3. Coreano  (4)
  4. Francês  (3)
  5. Norueguês  (2)
  6. Mais opções open sub menu

Buscando em bases de dados remotas. Favor aguardar.