Discover more insights into Encryption Scheme 암호화 체계

Keywords frequently search together with Encryption Scheme 암호화 체계

Narrow sentence examples with built-in keyword filters

Encryption Scheme sentence examples within ciphertext policy attribute



Efficient access control with traceability and user revocation in IoT


CP-ABE with Efficient Revocation Based on the KEK Tree in data Outsourcing System

Encryption Scheme sentence examples within orthogonal frequency division



Joint Encryption Scheme Based on the Chaotic DCT Matrix and SLM Algorithm in an OFDM-PON System


Channel-Based Dynamic Key Generation for Physical Layer Security in OFDM-PON Systems

Encryption Scheme sentence examples within chosen plaintext attack



An improved bit plane image encryption technique using RC4 and quantum chaotic demeanour


Chaos-based image encryption strategy based on random number embedding and DNA-level self-adaptive permutation and diffusion



Encryption Scheme sentence examples within visually secure image



Visual Secure Image Encryption Scheme Based on Compressed Sensing and Regional Energy


Visually secure image encryption using adaptive-thresholding sparsification and parallel compressive sensing

Encryption Scheme sentence examples within public key encryption



Cryptanalysis of Cramer-Shoup Like Cryptosystems Based on Index Exchangeable Family


Scalable and Efficient Hardware Architectures for Authenticated Encryption in IoT Applications

Encryption Scheme sentence examples within secure public key



On the CCA Compatibility of Public-Key Infrastructure


Fast Cramer-Shoup Cryptosystem

Encryption Scheme sentence examples within passive optical network



Physical layer data encryption using two-level constellation masking in 3D-CAP-PON


Chaotic Non-Orthogonal Matrix-Based Encryption for Secure OFDM-PONs

Encryption Scheme sentence examples within Image Encryption Scheme



Visual image encryption scheme based on BTC and LSB modification


Noise-Resistant Image Encryption Scheme for Medical Images in the Chaos and Wavelet Domain

Encryption Scheme sentence examples within Homomorphic Encryption Scheme



An Integrated Architecture for Maintaining Security in Cloud Computing Based on Blockchain


Approaches to the application of homomorphic encryption in sensor networks

Encryption Scheme sentence examples within Searchable Encryption Scheme



Secure and Verifiable Keyword Search in Multiple Clouds


Enabling Proxy-Free Privacy-Preserving and Federated Crowdsourcing by Using Blockchain

Encryption Scheme sentence examples within Key Encryption Scheme



Public-key encryption with bidirectional keyword search and its application to encrypted emails


A post-quantum secure communication system for cloud manufacturing safety

Encryption Scheme sentence examples within Proposed Encryption Scheme



An efficient dual-layer cross-coupled chaotic map security-based multi-image encryption system


Hyperchaos-Based Cryptosystem for Multimedia Data Security

Encryption Scheme sentence examples within Authenticated Encryption Scheme



Algebraic Fault Analysis of Subterranean 2.0


Security Analysis of Deterministic Re-keying with Masking and Shuffling: Application to ISAP

Encryption Scheme sentence examples within Hybrid Encryption Scheme



Hybrid Authentication and Confidentiality framework for Secure Cloud Computing


Hybrid Encryption Scheme for Hospital Financial Data Based on Noekeon Algorithm

Encryption Scheme sentence examples within Symmetric Encryption Scheme



A Reinforced Dynamic Multi-keyword Ranked Search with Forward Privacy


DBMS-Friendly Searchable Symmetric Encryption: Constructing Index Generation Suitable for Database Management Systems

Encryption Scheme sentence examples within Traditional Encryption Scheme



Image encryption algorithm with matrix semi-tensor product


An Expressive “Test-Decrypt-Verify” Attribute-Based Encryption Scheme With Hidden Policy for Smart Medical Cloud

Encryption Scheme sentence examples within Asymmetric Encryption Scheme



Ballot secrecy: Security definition, sufficient conditions, and analysis of Helios


Asymmetric multiparameter encryption of hyperspectral images based on hybrid chaotic mapping and an equal modulus decomposition tree.

Encryption Scheme sentence examples within Datum Encryption Scheme



Preventive Measures of Influencing Factors of Computer Network Security Technology


Physical layer data encryption using two-level constellation masking in 3D-CAP-PON

Encryption Scheme sentence examples within Advanced Encryption Scheme



Performance comparison between Chaos and quantum-chaos based image encryption techniques


Effect of payload security in MQTT protocol over transport and application layer

Encryption Scheme sentence examples within Integrated Encryption Scheme



Novel ECC-Based RFID Mutual Authentication Protocol for Emerging IoT Applications


Secure Elliptic Curve Crypto-Processor for Real-Time IoT Applications

Encryption Scheme sentence examples within Chaotic Encryption Scheme



Multi Wings Chaotic Encryption Scheme for PAM-DMT-Based Optical Access Network


Hyper-Chaotic Color Image Encryption Based on Transformed Zigzag Diffusion and RNA Operation

Encryption Scheme sentence examples within Functional Encryption Scheme



PrivCrowd: A Secure Blockchain-Based Crowdsourcing Framework with Fine-Grained Worker Selection


Controlled Functional Encryption Revisited: Multi-Authority Extensions and Efficient Schemes for Quadratic Functions

Encryption Scheme sentence examples within New Encryption Scheme



New encryption scheme using k-Fibonacci-like sequence


WeStat: a Privacy-Preserving Mobile Data Usage Statistics System

Encryption Scheme sentence examples within Novel Encryption Scheme



ECB2: A novel encryption scheme using face biometrics for signing blockchain transactions


A secure image encryption scheme based on genetic mutation and MLNCML chaotic system

Encryption Scheme sentence examples within Different Encryption Scheme



Efficient sensitivity orient blockchain encryption for improved data security in cloud


Distributed Query Evaluation over Encrypted Data

Encryption Scheme sentence examples within Audio Encryption Scheme



A three-dimensional chaotic map and their applications to digital audio security


Конструирование мегастабильных систем с многомерной решеткой хаотических аттракторов

Encryption Scheme sentence examples within Based Encryption Scheme



Empirical analysis of security enabled cloud computing strategy using attribute based encryption scheme


Blockchain based Multi-Authority Fine-Grained Access Control System with Flexible Revocation

Encryption Scheme sentence examples within Optical Encryption Scheme



Physical Layer Encryption for WDM Optical Communication Systems Using Private Chaotic Phase Scrambling


Nonlinear Bicolor Holography Using Plasmonic Metasurfaces.

Encryption Scheme sentence examples within Preserving Encryption Scheme



A Review of Order Preserving Encryption Schemes


BIOFUSE: A framework for multi-biometric fusion on biocryptosystem level

Encryption Scheme sentence examples within Lightweight Encryption Scheme



Ecc-bAsed ScalablE Revocation(EASER) scheme for selective sharing in resource-constrained devices


Towards a Compressive-Sensing-Based Lightweight Encryption Scheme for the Internet of Things

Encryption Scheme sentence examples within End Encryption Scheme



A Table Based Attack Detection (TBAD) scheme for Internet of Things: An approach for Smart City Environment


Light-weight Internet-of-Things Device Authentication, Encryption and Key Distribution using End-to-End Neural Cryptosystems

Encryption Scheme sentence examples within Efficient Encryption Scheme



Challenges in Cryptography


PCS-ABE (t, n): a secure threshold multi authority CP-ABE scheme based efficient access control systems for cloud environment

Encryption Scheme sentence examples within Selective Encryption Scheme



Construction of Perceptual Security Dataset for Video Selective Encryption Based on Double-Blind Subjective Experiment


Optical selective encryption based on the FRFCM algorithm and face biometric for the medical image

Encryption Scheme sentence examples within Threshold Encryption Scheme



Tenant-Led Ciphertext Information Flow Control for Cloud Virtual Machines


Turning HATE into LOVE: Compact Homomorphic Ad Hoc Threshold Encryption for Scalable MPC

Encryption Scheme sentence examples within Graph Encryption Scheme



Privacy-Preserving Approximate Top-k Nearest Keyword Queries over Encrypted Graphs


Efficient Graph Encryption Scheme for Shortest Path Queries

Encryption Scheme sentence examples within Designed Encryption Scheme



A New Fractional Chaotic System and Its Application in Image Encryption With DNA Mutation


An efficient image encryption scheme based on double affine substitution box and chaotic system

Encryption Scheme sentence examples within Robust Encryption Scheme



MurQRI: Encrypted Multi-layer QR Codes for Electronic Identity Management


Robust cryptosystem using a new hyperchaotic oscillator with stricking dynamic properties

Encryption Scheme sentence examples within Modern Encryption Scheme



SECRECY CODING IN THE INTEGRATED NETWORKENHANCED TELEMETRY (iNET)


SECRECY CODING IN THE INTEGRATED NETWORKENHANCED TELEMETRY (iNET)

Encryption Scheme sentence examples within Aware Encryption Scheme



Crash-Consistency-Aware Encryption for Non-Volatile Memories


Compiler-Assisted Semantic-Aware Encryption for Efficient and Secure Serverless Computing

Encryption Scheme sentence examples within Complex Encryption Scheme



Decentralized blockchain based authentication for secure data sharing in Cloud-IoT


Staged data delivery protocol: A blockchain‐based two‐stage protocol for non‐repudiation data delivery

Encryption Scheme sentence examples within Two Encryption Scheme



Security and Privacy using Two Fold Encryption Protocol Techniques in Edge Computing


Two Public-Key Cryptosystems Based on Expanded Gabidulin Codes

Encryption Scheme sentence examples within Information Encryption Scheme



Information Transmission Scheme between Train and RBC Based on AES-ECC Algorithm


Information Encryption Scheme Based on Chaotic Map and Hybridization Chain Reaction

Encryption Scheme sentence examples within Simple Encryption Scheme



FPGA implementation of a lightweight simple encryption scheme to secure IoT using novel key scheduling technique


Window of multistability and its control in a simple 3D Hopfield neural network: application to biomedical image encryption

Encryption Scheme sentence examples within Block Encryption Scheme



Performance Enhancing Secure Erasure Code (PESEC) for Cloud Storage using Random N Blocks Encryption


An adaptive cryptosystem on a Finite Field

Encryption Scheme sentence examples within Suggested Encryption Scheme



New extension of data encryption standard over 128-bit key for digital images


Secure OFDM-Based NOMA for Machine-to-Machine Communication

Encryption Scheme sentence examples within Secret Encryption Scheme



Fine-Grained Forward Secrecy: Allow-List/Deny-List Encryption and Applications


A Novel Encryption Approach Based on Vigenère Cipher for Secure Data Communication

Encryption Scheme sentence examples within Layer Encryption Scheme



Research on Physical Layer Encryption Technology of HST 5G communication system with spatial permutation modulation


Inference Attack-Resistant E-Healthcare Cloud System with Fine-Grained Access Control

Encryption Scheme sentence examples within Level Encryption Scheme



High Capacity Reversible Data Hiding in Encrypted Image Based on Intra-Block Lossless Compression


High-capacity separable reversible data-Hiding method in encrypted images based on block-level encryption and Huffman compression coding

Encryption Scheme sentence examples within Way Encryption Scheme



Cybersecurity in logistics and supply chain management: An overview and future research directions


Integration of recurrent convolutional neural network and optimal encryption scheme for intrusion detection with secure data storage in the cloud

Encryption Scheme sentence examples within Conventional Encryption Scheme



Secret Sharing-based Personal Health Records Management for the Internet of Health Things


A Review on Challenges and Latest Trends on Cyber Security Using Text Cryptography

Learn more from Encryption Scheme 암호화 체계