نتایج جستجو برای: simultaneous encryption

تعداد نتایج: 143810  

Journal: :International Journal of Advances in Scientific Research and Engineering 2021

2005
Hanping Lufei Weisong Shi

Using encryption for secure communication plays an important role in building applications in mobile computing environments. With the emergence of more and more heterogeneous devices and diverse networks, it is difficult, if not impossible, to use a one-size-fits-all encryption algorithm that always has the best performance in such a dynamic environment. We envision that the only way to acceler...

Journal: :CoRR 2017
Gregory B. Rehm Michael Thompson Brad Busenius Jennifer Fowler

Email cryptography applications often suffer from major problems that prevent their widespread implementation. MEG, or the Mobile Encryption Gateway aims to fix the issues associated with email encryption by ensuring that encryption is easy to perform while still maintaining data security. MEG performs automatic decryption and encryption of all emails using PGP. Users do not need to understand ...

2012
Dhananjaya Singh

Data encryption is the conversion of data into a form, called a ciphertext, that cannot be easily understood by unauthorized people. Decryption is the process of converting encrypted data back into its original form, so it is easily understood. In literature, different techniques are used for encryption and decryption of text, image, audio and video. RSA (Rivest, Shamir, Aldeman) encryption tec...

2006
Thomas Stütz Andreas Uhl

Many application scenarios do not demand confidential encryption of visual data, but on the contrary require that certain image information is public (transparent encryption). One scenario is e.g., PayTV, where a low quality version should become public to attract possible customers. Transparent encryption can be implemented most efficiently in case of scalable bitstreams by encrypting enhancem...

Journal: :Arteriosclerosis, Thrombosis, and Vascular Biology 2006

Journal: :Financial Mathematics and Fintech 2022

Abstract In 1978, Rivest et al. (1978) proposed the concepts of data bank and fully homomorphic encryption. Some individuals organizations encrypt original store them in for privacy protection. Data is also called cloud. Therefore, cloud stores a large amount data, which obviously huge wealth. How to use these effectively? First all, we must solve problem calculation encrypted problem. Rivest, ...

2012
John Singh

Problem statement: When we send any video data over the network it consumes more time. This is due to the huge size of the video file when compared to text file. Therefore, video data should be compressed before sending to the destination. Another important factor during data transfer is security. Joint compression and encryption is employed to enable faster and secured transmission of video da...

Journal: :IACR Cryptology ePrint Archive 2009
Jae Hong Seo Tetsutaro Kobayashi Miyako Ohkubo Koutarou Suzuki

Efficient and privacy-preserving constructions for search functionality on encrypted data is important issues for data outsourcing, and data retrieval, etc. Fully secure anonymous Hierarchical ID-Based Encryption (HIBE) schemes is useful primitives that can be applicable to searchable encryptions [4], such as ID-based searchable encryption, temporary searchable encryption [1], and anonymous for...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید