Vyzkoušejte nový nástroj s podporou AI
Summon Research Assistant
BETA
Loading…
Loading…
A New Approach to Image Sharing with High-Security Threshold Structure
Wang, Xiaojing, Yuan, Qizhao, Cai, Hongliang, Fang, Jiajia
Published in Journal of the ACM (01.11.2014)
Published in Journal of the ACM (01.11.2014)
Get full text
Journal Article
Loading…
Loading…
Constructive Side-Channel Analysis and Secure Design: 12th International Workshop, COSADE 2021, Lugano, Switzerland, October 25–27, 2021, Proceedings
Year of Publication 2021
Get full text
Conference Proceeding
Loading…
Loading…
From Network Security to Network Autonomous
Wang, Yubian, Yuri, Shebzukhov
Published in International journal of advanced network, monitoring, and controls (01.01.2019)
Published in International journal of advanced network, monitoring, and controls (01.01.2019)
Get full text
Journal Article
Loading…
Loading…
Transient Management of Data Encryption and Authentication
Year of Publication 20.09.2018
Get full text
Patent
Loading…
Loading…
An Encryption Methodology for Enabling the Use of Data Warehouses on the Cloud
Lopes, Claudivan Cruz, Cesário-Times, Valéria, Matwin, Stan, Ciferri, Cristina Dutra de Aguiar, Ciferri, Ricardo Rodrigues
Published in International journal of data warehousing and mining (01.10.2018)
Published in International journal of data warehousing and mining (01.10.2018)
Get full text
Journal Article
Loading…
Shared data encryption and confidentiality
BARACALDO NATHALIE, GLIDER JOSEPH S, ANDROULAKI ELLI, SORNIOTTI ALESSANDRO
Year of Publication 19.07.2016
Get full text
Year of Publication 19.07.2016
Patent
Loading…
Loading…
Loading…
Server-Aided Revocable Identity-Based Encryption
Qin, Baodong, Deng, Robert H., Li, Yingjiu, Liu, Shengli
Published in Computer Security -- ESORICS 2015 (2015)
Published in Computer Security -- ESORICS 2015 (2015)
Get full text
Book Chapter
Loading…