Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2629)
Editorial
(398)
by Journal
by Funding Agency
Clear filters
Powered by
54 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: E.3 - DATA ENCRYPTION
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
1
2
3
4
5
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
Enabling User Access Control in Energy-constrained Wireless Smart Environments
Juan Álvaro Muñoz Naranjo
,
Pablo Orduña
,
Aitor Gómez-Goiri
,
Diego López-De-Ipiña
,
Leocadio Casado
Part of: Towards Sustainable Computing through Ambient Intelligence
10.3217/jucs-019-17-2490
01-11-2013
Unique: 544 | Total: 687
| Access Period:
2490-2502
HTML
XML
PDF
Research Article
Observations of Skipjack-like Structure with SP/SPS Round Function
Ting Cui
,
Chenhui Jin
,
Guoshuang Zhang
Part of: Information Security
10.3217/jucs-019-16-2453
01-10-2013
Unique: 441 | Total: 579
| Access Period:
2453-2471
HTML
XML
PDF
Research Article
Multiplication and Squaring with Shifting Primes on OpenRISC Processors with Hardware Multiplier
Leandro Marin
,
Antonio Jara
,
Antonio Skarmeta
Part of: Information Security
10.3217/jucs-019-16-2368
01-10-2013
Unique: 539 | Total: 718
| Access Period:
2368-2384
HTML
XML
PDF
Research Article
An Efficient Ciphertext-Policy Attribute-Based Access Control towards Revocation in Cloud Computing
Xingxing Xie
,
Hua Ma
,
Jin Li
,
Xiaofeng Chen
Part of: Information Security
10.3217/jucs-019-16-2349
01-10-2013
Unique: 507 | Total: 633
| Access Period:
2349-2367
HTML
XML
PDF
Research Article
New Results of Related-key Attacks on All Py-Family of Stream Ciphers
Lin Ding
,
Jie Guan
,
Wen-long Sun
Part of: An Overview of Current Information Systems Security Challenges and Innovations
10.3217/jucs-018-12-1741
28-06-2012
Unique: 512 | Total: 633
| Access Period:
1741-1756
HTML
XML
PDF
Research Article
Modeling and Performance Evaluation of a Contract-based Electronic Signature Process
Ahmed Nait-Sidi-Moh
,
Mohamed Bakhouya
,
Wafaa Ait-Cheik-Bihi
,
Jaafar Gaber
10.3217/jucs-018-05-0676
01-03-2012
Unique: 575 | Total: 761
| Access Period:
676-703
HTML
XML
PDF
Research Article
Security Analysis of Three Password Authentication Schemes
Kyung-Ah Shim
10.3217/jucs-017-11-1623
01-07-2011
Unique: 338 | Total: 404
| Access Period:
1623-1633
HTML
XML
PDF
Research Article
Watermarking Techniques for Relational Databases: Survey, Classification and Comparison
Raju Halder
,
Shantanu Pal
,
Agostino Cortesi
10.3217/jucs-016-21-3164
01-12-2010
Unique: 404 | Total: 547
| Access Period:
3164-3190
HTML
XML
PDF
Research Article
Graph-Based Approach to the Edit Distance Cryptanalysis of Irregularly Clocked Linear Feedback Shift Registers
Pino Caballero-Gil
,
Amparo Fúster-Sabater
,
Candelaria Hernández-Goya
10.3217/jucs-015-15-2981
01-09-2009
Unique: 308 | Total: 357
| Access Period:
2981-2998
HTML
XML
PDF
Research Article
Information Theoretically Secure Encryption with Almost Free Authentication
Basel Alomair
,
Radha Poovendran
10.3217/jucs-015-15-2937
01-09-2009
Unique: 369 | Total: 480
| Access Period:
2937-2956
HTML
XML
PDF
Research Article
Ideal Homogeneous Access Structures Constructed from Graphs
Javier Herranz
10.3217/jucs-015-14-2881
01-08-2009
Unique: 327 | Total: 369
| Access Period:
2881-2893
HTML
XML
PDF
Research Article
Certificate-based Signatures Revisited
Wei Wu
,
Yi Mu
,
Willy Susilo
,
Xinyi Huang
10.3217/jucs-015-08-1659
28-04-2009
Unique: 323 | Total: 366
| Access Period:
1659-1684
HTML
XML
PDF
1
2
3
4
5
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK