نتایج جستجو برای: encryption

تعداد نتایج: 27368  

2016
Adam O’Neill

The first type of specialized encryption scheme that can be used in secure outsourced storage we will look at is property-preserving encryption. This is encryption where some desired property of the plaintexts is intentionally leaked by the ciphertexts. The two main examples we will study are deterministic encryption, which preserves the equality property, and order preserving encryption, which...

2012
Darshana Hooda Parvinder Singh Thomas Eisenbarth Fuwen Liu C. P. Wu Eugene T. Lin Gregory W. Cook Paul Salama Edward J. Delp T. B. Maples G. A. Spanos Euijin Choo Jehyun Lee Heeio Lee Giwon Nam

Encryption is the widely used technique to offer security for video communication and considerable numbers of video encryption algorithms have been proposed. The paper explores the literature for already proposed video encryption algorithms with the focus on the working principle of already proposed video encryption schemes. This study is aimed to give readers a quick overview about various vid...

2015
R. Manjusha R. Ramachandran

Now a day’s everyone storing there data in cloud because we can’t depends on hard drives if they crash one can’t have backup for ever data. Famous Cloud storage applications are Drop box, Google drive, Sky drive, Box, Amazon cloud drive, Surdoc and Apple icloud. In cloud data security is provided by various security algorithms. In our research we have chosen attribute based encryption technique...

2017
Mohammad Hajiabadi Bruce M. Kapron

We address the problems of whether t-circular-secure encryption can be based on (t − 1)-circular-secure encryption or on semantic (CPA) security, if t = 1. While for t = 1 a folklore construction, based on CPA-secure encryption, can be used to build a 1-circular-secure encryption with the same secret-key and message space, no such constructions are known for the bit-encryption case, which is of...

2013
Chin-Feng Lin

In the paper, we use Microsoft’s Visual Studio Development Kit and the C# programming language to implement chaos-based electroencephalogram (EEG) encryption system with three encryption levels. A chaos logic map, an initial value, and a bifurcation parameter for the map are used to generate level I chaosbased EEG encryption bit streams. Two encryption-level parameters are added to these elemen...

Journal: :International Journal of Engineering & Technology 2018

Journal: :Современные наукоемкие технологии (Modern High Technologies) 2020

Journal: :DÜMF Mühendislik Dergisi 2020

Journal: :International Journal for Research in Applied Science and Engineering Technology 2018

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید