Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2765)
Editorial
(423)
by Journal
by Funding Agency
Clear filters
Powered by
57 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: E.3 - DATA ENCRYPTION
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
1
2
3
4
5
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
Meta-learning approach for variational autoencoder hyperparameter tuning
Michele Berti
,
Matheus Camilo da Silva
,
Sebastiano Saccani
,
Sylvio Barbon Junior
10.3897/jucs.124087
28-06-2025
Unique: 1176 | Total: 1559
Access Period: 0
0
668-682
HTML
PDF
Research Article
Cross-device Portability of Machine Learning Models in Electromagnetic Side-Channel Analysis for Forensics
Lojenaa Navanesan
,
Nhien-An Le-Khac
,
Yossi Oren
,
Kasun De Zoysa
,
Asanka P. Sayakkara
10.3897/jucs.109788
28-09-2024
Unique: 1674 | Total: 2301
Access Period: 0
0
1390-1423
HTML
PDF
Research Article
Archive-based Covert Channel in Sensor Streaming Data
Carina Heßeling
,
Sebastian Litzinger
,
Jörg Keller
10.3897/jucs.108811
28-08-2024
Unique: 1265 | Total: 1667
Access Period: 0
0
1048-1067
HTML
PDF
Research Article
Towards Secure and Efficient "white-box" Encryption
Gurgen Khachatrian
,
Sergey Abrahamyan
Part of: Collaborative Technologies and Data Science in Smart City Applications
10.3217/jucs-025-08-0868
28-08-2019
Unique: 1210 | Total: 2004
Access Period: 0
0
868-886
HTML
XML
PDF
Research Article
A New Identification Scheme based on Syndrome Decoding Problem with Provable Security against Quantum Adversaries
Bagus Santoso
,
Chunhua Su
Part of: Advances of Provable Security Techniques
10.3217/jucs-025-03-0294
28-03-2019
Unique: 1362 | Total: 2266
Access Period: 0
0
294-308
HTML
XML
PDF
Research Article
CCA-Secure Deterministic Identity-Based Encryption Scheme
Meijuan Huang
,
Bo Yang
,
Yi Zhao
,
Kaitai Liang
,
Liang Xue
,
Xiaoyi Yang
Part of: Advances of Provable Security Techniques
10.3217/jucs-025-03-0245
28-03-2019
Unique: 1432 | Total: 2392
Access Period: 0
0
245-269
HTML
XML
PDF
Research Article
Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption
Yunling Wang
,
Jianfeng Wang
,
Shi-Feng Sun
,
Joseph Liu
,
Willy Susilo
,
Joonsang Baek
,
Ilsun You
,
Xiaofeng Chen
Part of: Advances of Provable Security Techniques
10.3217/jucs-025-03-0222
28-03-2019
Unique: 1548 | Total: 2407
Access Period: 0
0
222-244
HTML
XML
PDF
Research Article
Provably Secure Ciphertext-Policy Attribute-Based Encryption from Identity-Based Encryption
Yi-Fan Tseng
,
Chun-I Fan
,
Chih-Wen Lin
Part of: Advances of Provable Security Techniques
10.3217/jucs-025-03-0182
28-03-2019
Unique: 1295 | Total: 2131
Access Period: 0
0
182-202
HTML
XML
PDF
Research Article
Natural sd-RCCA Secure Public-key Encryptions from Hybrid Paradigms
Yuan Chen
,
Qingkuan Dong
,
Yannan Li
,
Qiqi Lai
,
Zhedong Wang
Part of: Advances of Provable Security Techniques
10.3217/jucs-025-03-0158
28-03-2019
Unique: 1286 | Total: 2102
Access Period: 0
0
158-181
HTML
XML
PDF
Research Article
Verifying Secure Authentication Protocol for Communication between IoT-based Medical Devices
Nipon Theera-Umpon
,
Kun-Hee Han
,
Woo-Sik Bae
,
Sanghyuk Lee
,
Van Pham
Part of: Recent Advancements in Big Data Technologies and Applications in Computing, IoT and Computer Engineering Technology
10.3217/jucs-024-09-1258
28-09-2018
Unique: 1142 | Total: 1586
Access Period: 0
0
1258-1270
HTML
XML
PDF
Research Article
Proving Anonymity for BILMIX
Andrea Huszti
,
Zita Kovács
10.3217/jucs-024-07-0892
28-07-2018
Unique: 1050 | Total: 1811
Access Period: 0
0
892-915
HTML
XML
PDF
Research Article
Identifying Encryption Algorithms in ECB and CBC Modes Using Computational Intelligence
Flavio De Mello
,
José A. M. Xexéo
10.3217/jucs-024-01-0025
28-01-2018
Unique: 1336 | Total: 1989
Access Period: 0
0
25-42
HTML
XML
PDF
1
2
3
4
5
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK