Encryption

Results: 4595



#Item
621

UC-Secure Searchable Symmetric Encryption Kaoru Kurosawa and Yasuhiro Ohtaki Ibaraki University, Japan {kurosawa, y.ohtaki}@mx.ibaraki.ac.jp Abstract. For searchable symmetric encryption schemes (or symmetrickey encrypt

Add to Reading List

Source URL: fc12.ifca.ai

Language: English - Date: 2012-02-18 14:33:36
    622Internet privacy

    Multi-User Searchable Encryption in the Cloud Cédric Van Rompay, Refik Molva, and Melek Önen ISC 2015 th September 10 , 2015 | Trondheim, Norway

    Add to Reading List

    Source URL: isc2015.item.ntnu.no

    Language: English - Date: 2015-09-19 12:54:02
      623

      Joint Encryption Error Correction and Modulation (JEEM) Scheme Oluwayomi Adamo, Member, IEEE, Eric Ayeh, Student Member, IEEE, and Murali Varanasi, Life Fellow, IEEE Abstract—The major challenges facing resource constr

      Add to Reading List

      Source URL: nsl.cse.unt.edu

      Language: English - Date: 2014-10-22 22:55:11
        624

        The Limited Power of Verification Queries in Message Authentication and Authenticated Encryption September 29, 2015

        Add to Reading List

        Source URL: www1.spms.ntu.edu.sg

        Language: English - Date: 2015-10-05 00:19:27
          625

          Automatically Verified Mechanized Proof of One-Encryption Key Exchange

          Add to Reading List

          Source URL: prosecco.gforge.inria.fr

          Language: English - Date: 2012-10-01 07:25:55
            626

            or with entcsmacro.sty for your meeting. Both can be found at the ENTCS Macro Home Page. Explicit Randomness is not Necessary when Modeling Probabilistic Encryption 1 V´eronique Cortier Heinrich H¨ordegen Bogdan Warins

            Add to Reading List

            Source URL: www.loria.fr

            Language: English - Date: 2007-01-12 11:55:22
              627

              Fully Homomorphic Encryption without Bootstrapping Zvika Brakerski Weizmann Institute of Science Craig Gentry∗ IBM T.J. Watson Research Center

              Add to Reading List

              Source URL: eprint.iacr.org

              Language: English - Date: 2011-08-11 02:21:08
                628

                READY Secure USB 3.0 Portable Hard Drive With real-time XTS-AES 256-bit hardware encryption, software free design and a super speed USB 3.0 connection, the perfect blend of security, durability

                Add to Reading List

                Source URL: www.istorage-uk.com

                Language: English - Date: 2015-08-10 08:35:57
                  629

                  Lattice Encryption Vadim Lyubashevsky INRIA / ENS, Paris

                  Add to Reading List

                  Source URL: www.cs.bris.ac.uk

                  - Date: 2014-08-05 12:28:54
                    630

                    Non-interactive Zero-Knowledge from Homomorphic Encryption Ivan Damg˚ ard1 , Nelly Fazio2, , and Antonio Nicolosi2, Aarhus University, Denmark

                    Add to Reading List

                    Source URL: www.cs.stevens.edu

                    Language: English - Date: 2010-03-09 16:23:49
                      UPDATE