Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2694)
Editorial
(409)
by Journal
by Funding Agency
Clear filters
Powered by
56 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: E.3 - DATA ENCRYPTION
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
1
2
3
4
5
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
Cross-device Portability of Machine Learning Models in Electromagnetic Side-Channel Analysis for Forensics
Lojenaa Navanesan
,
Nhien-An Le-Khac
,
Yossi Oren
,
Kasun De Zoysa
,
Asanka P. Sayakkara
10.3897/jucs.109788
28-09-2024
Unique: 465 | Total: 643
| Access Period:
1390-1423
HTML
PDF
Research Article
Archive-based Covert Channel in Sensor Streaming Data
Carina Heßeling
,
Sebastian Litzinger
,
Jörg Keller
10.3897/jucs.108811
28-08-2024
Unique: 450 | Total: 586
| Access Period:
1048-1067
HTML
PDF
Research Article
Towards Secure and Efficient "white-box" Encryption
Gurgen Khachatrian
,
Sergey Abrahamyan
Part of: Collaborative Technologies and Data Science in Smart City Applications
10.3217/jucs-025-08-0868
28-08-2019
Unique: 865 | Total: 1475
| Access Period:
868-886
HTML
XML
PDF
Research Article
A New Identification Scheme based on Syndrome Decoding Problem with Provable Security against Quantum Adversaries
Bagus Santoso
,
Chunhua Su
Part of: Advances of Provable Security Techniques
10.3217/jucs-025-03-0294
28-03-2019
Unique: 975 | Total: 1671
| Access Period:
294-308
HTML
XML
PDF
Research Article
CCA-Secure Deterministic Identity-Based Encryption Scheme
Meijuan Huang
,
Bo Yang
,
Yi Zhao
,
Kaitai Liang
,
Liang Xue
,
Xiaoyi Yang
Part of: Advances of Provable Security Techniques
10.3217/jucs-025-03-0245
28-03-2019
Unique: 1033 | Total: 1775
| Access Period:
245-269
HTML
XML
PDF
Research Article
Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption
Yunling Wang
,
Jianfeng Wang
,
Shi-Feng Sun
,
Joseph Liu
,
Willy Susilo
,
Joonsang Baek
,
Ilsun You
,
Xiaofeng Chen
Part of: Advances of Provable Security Techniques
10.3217/jucs-025-03-0222
28-03-2019
Unique: 1104 | Total: 1753
| Access Period:
222-244
HTML
XML
PDF
Research Article
Provably Secure Ciphertext-Policy Attribute-Based Encryption from Identity-Based Encryption
Yi-Fan Tseng
,
Chun-I Fan
,
Chih-Wen Lin
Part of: Advances of Provable Security Techniques
10.3217/jucs-025-03-0182
28-03-2019
Unique: 905 | Total: 1538
| Access Period:
182-202
HTML
XML
PDF
Research Article
Natural sd-RCCA Secure Public-key Encryptions from Hybrid Paradigms
Yuan Chen
,
Qingkuan Dong
,
Yannan Li
,
Qiqi Lai
,
Zhedong Wang
Part of: Advances of Provable Security Techniques
10.3217/jucs-025-03-0158
28-03-2019
Unique: 898 | Total: 1540
| Access Period:
158-181
HTML
XML
PDF
Research Article
Verifying Secure Authentication Protocol for Communication between IoT-based Medical Devices
Nipon Theera-Umpon
,
Kun-Hee Han
,
Woo-Sik Bae
,
Sanghyuk Lee
,
Van Pham
Part of: Recent Advancements in Big Data Technologies and Applications in Computing, IoT and Computer Engineering Technology
10.3217/jucs-024-09-1258
28-09-2018
Unique: 791 | Total: 1088
| Access Period:
1258-1270
HTML
XML
PDF
Research Article
Proving Anonymity for BILMIX
Andrea Huszti
,
Zita Kovács
10.3217/jucs-024-07-0892
28-07-2018
Unique: 766 | Total: 1388
| Access Period:
892-915
HTML
XML
PDF
Research Article
Identifying Encryption Algorithms in ECB and CBC Modes Using Computational Intelligence
Flavio De Mello
,
José A. M. Xexéo
10.3217/jucs-024-01-0025
28-01-2018
Unique: 928 | Total: 1318
| Access Period:
25-42
HTML
XML
PDF
Research Article
On Real-valued Visual Cryptographic Basis Matrices
Neil Buckley
,
Atulya Nagar
,
Subramanian Arumugam
10.3217/jucs-021-12-1536
01-11-2015
Unique: 635 | Total: 824
| Access Period:
1536-1562
HTML
XML
PDF
1
2
3
4
5
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK