Multiple encryption

Results: 17



#Item
1Microsoft PowerPoint - ch5.ppt [相容模式]

Microsoft PowerPoint - ch5.ppt [相容模式]

Add to Reading List

Source URL: people.cs.nctu.edu.tw

Language: English - Date: 2012-08-25 21:38:28
2Microsoft PowerPoint - Geoencryption Authentication Di Qiu May 2006.ppt

Microsoft PowerPoint - Geoencryption Authentication Di Qiu May 2006.ppt

Add to Reading List

Source URL: gps.stanford.edu

Language: English - Date: 2006-06-13 19:25:54
3Threshold Encryption into Multiple Ciphertexts Martin Stanek Department of Computer Science Comenius University

Threshold Encryption into Multiple Ciphertexts Martin Stanek Department of Computer Science Comenius University

Add to Reading List

Source URL: fps2011.dyndns.org

Language: English
    4Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with Multiple Data Owners Frank Li† †  Richard Shin†

    Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with Multiple Data Owners Frank Li† † Richard Shin†

    Add to Reading List

    Source URL: www.icir.org

    Language: English - Date: 2015-10-01 22:05:30
    5Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with Multiple Data Owners Frank Li Richard Shin Vern Paxson

    Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with Multiple Data Owners Frank Li Richard Shin Vern Paxson

    Add to Reading List

    Source URL: www.eecs.berkeley.edu

    Language: English - Date: 2015-07-29 20:02:16
    6Efficient Searchable Symmetric Encryption for Storing Multiple Source Data on Cloud † Faculty  Chang Liu† , Liehuang Zhu‡ , and Jinjun Chen† ,

    Efficient Searchable Symmetric Encryption for Storing Multiple Source Data on Cloud † Faculty Chang Liu† , Liehuang Zhu‡ , and Jinjun Chen† ,

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2015-04-20 04:09:39
    7Nippon Telegraph and Telephone Corporation Mitsubishi Electric Corporation New Authenticated Encryption Algorithm Features Robust Resistance to Multiple Misuse TOKYO, March 17, 2014 – Nippon Telegraph and Telephone Cor

    Nippon Telegraph and Telephone Corporation Mitsubishi Electric Corporation New Authenticated Encryption Algorithm Features Robust Resistance to Multiple Misuse TOKYO, March 17, 2014 – Nippon Telegraph and Telephone Cor

    Add to Reading List

    Source URL: www.mitsubishielectric.com

    Language: English - Date: 2015-02-03 21:03:02
    8Microsoft Word - Weakness of shim’s New ID-based tripartite multiple-key agreement protocol最終版.doc

    Microsoft Word - Weakness of shim’s New ID-based tripartite multiple-key agreement protocol最終版.doc

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2005-12-13 03:19:10
    9Differential Fault Analysis of AES using a Single Multiple-Byte Fault Subidh Ali1 , Debdeep Mukhopadhyay1, and Michael Tunstall2 1  Department of Computer Sc. and Engg, IIT Kharagpur, West Bengal, India.

    Differential Fault Analysis of AES using a Single Multiple-Byte Fault Subidh Ali1 , Debdeep Mukhopadhyay1, and Michael Tunstall2 1 Department of Computer Sc. and Engg, IIT Kharagpur, West Bengal, India.

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2010-12-14 06:50:46
    10Data Encryption Systems announces major addition to award-winning DESlock+ New version offers multiple software encryption keys and increased administrative capability Taunton, UK 20th September 2005 – Data Encryption

    Data Encryption Systems announces major addition to award-winning DESlock+ New version offers multiple software encryption keys and increased administrative capability Taunton, UK 20th September 2005 – Data Encryption

    Add to Reading List

    Source URL: download.deslock.com

    Language: English - Date: 2014-05-01 10:03:18