Academic literature on the topic 'Encrypted'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Encrypted.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Encrypted"

1

Sonawane, Supriya S., and N. M. Shahane. "Separable Encrypted Data Embedding in Encrypted Image with Large Data Embedding Capacity." COMPUSOFT: An International Journal of Advanced Computer Technology 03, no. 06 (2014): 873–78. https://doi.org/10.5281/zenodo.14742667.

Full text
Abstract:
This paper proposes a novel scheme of separable encrypted data embedding in encrypted image with large data embedding capacity. An image encrypts using cryptography algorithm and secret data encrypts using hybrid cryptography. Then, the encrypted secret data can be successfully embedded in the encrypted cover image using Modified BPCS steganography. An encrypted image containing encrypted data is sent. At the receiver side, with an encrypted image containing embedded encrypted data, if a receiver has the data hiding key and data encryption key then he is only able to extract the encrypted and
APA, Harvard, Vancouver, ISO, and other styles
2

Haggag, Ayman, Mohamed Ghoneim, Jianming Lu, and Takashi Yahagi. "Access Control and Scalable Encryption Using a Stream Cipher for JPEG 2000 Encoded Images." Journal of Advanced Computational Intelligence and Intelligent Informatics 11, no. 7 (2007): 728–34. http://dx.doi.org/10.20965/jaciii.2007.p0728.

Full text
Abstract:
The access control and scalable encryption scheme we propose for JPEG 2000 encoded images encrypts JEPG 2000 codestreams using the SNOW 2 progressive encryption algorithm to encrypt resolutions, quality layers, or packets independently to provide resolution, quality or fine-grain scalability. Access is controlled to different image resolutions or quality levels granted to different users receiving the same encrypted JPEG 2000 codestream but having different decryption keys. Keys used with successive resolutions or quality layers are mutually dependent based on the SHA-256 one-way hashing funct
APA, Harvard, Vancouver, ISO, and other styles
3

Hamano, Genki, Shoko Imaizumi, and Hitoshi Kiya. "Effects of JPEG Compression on Vision Transformer Image Classification for Encryption-then-Compression Images." Sensors 23, no. 7 (2023): 3400. http://dx.doi.org/10.3390/s23073400.

Full text
Abstract:
This paper evaluates the effects of JPEG compression on image classification using the Vision Transformer (ViT). In recent years, many studies have been carried out to classify images in the encrypted domain for privacy preservation. Previously, the authors proposed an image classification method that encrypts both a trained ViT model and test images. Here, an encryption-then-compression system was employed to encrypt the test images, and the ViT model was preliminarily trained by plain images. The classification accuracy in the previous method was exactly equal to that without any encryption
APA, Harvard, Vancouver, ISO, and other styles
4

Hussien, Nadia, Nadia Mahmood Hussien, Saba Abdulbaqi Salman, and Mohammad Aljanabi. "Secure Federated Learning with a Homomorphic Encryption Model." International Journal Papier Advance and Scientific Review 4, no. 3 (2023): 1–7. http://dx.doi.org/10.47667/ijpasr.v4i3.235.

Full text
Abstract:
Federated learning (FL) offers collaborative machine learning across decentralized devices while safeguarding data privacy. However, data security and privacy remain key concerns. This paper introduces "Secure Federated Learning with a Homomorphic Encryption Model," addressing these challenges by integrating homomorphic encryption into FL. The model starts by initializing a global machine learning model and generating a homomorphic encryption key pair, with the public key shared among FL participants. Using this public key, participants then collect, preprocess, and encrypt their local data. D
APA, Harvard, Vancouver, ISO, and other styles
5

Luu Hong Dung, Nguyen Vinh Thai, Nguyen Kim Thanh, and Pham Van Hiep. "A method for constructing public - key block cipher schemes based on discrete logarithm problem." Journal of Military Science and Technology, CSCE7 (December 30, 2023): 15–26. http://dx.doi.org/10.54939/1859-1043.j.mst.csce7.2023.15-26.

Full text
Abstract:
The paper proposes a method for constructing block cipher schemes that enables verifying the source and integrity of the encrypted message. Additionally, the shared secret key between the sender/encryptor and the receiver/decryptor for each encrypted message is established based on the mechanism of public key cryptography.
APA, Harvard, Vancouver, ISO, and other styles
6

Naik, Mr Shiva Kumar R., Kshitij Yadav, Hari Om yadav, Niha C. Gowda, and Mounika. "Data Recovery from Encrypted Image and Recovering Image." International Journal of Engineering and Advanced Technology 8, no. 5s (2019): 76–79. http://dx.doi.org/10.35940/ijeat.e1016.0585s19.

Full text
Abstract:
This paper refers to the data hiding technique in an encrypted image and restoring image as it was before to its fullest. There are three bids of the framework to this process, which are a content owner, data hiding and recipient. The content owner encrypts the image with ciphertext making it an encrypted image. Data hider channelizes encrypted image into 3 different channels and adds each with additional bits in order to obtain marked encrypted image. At the recipient end, the noise from the image could be removed consuming the extraction key and the image obtained will be intact as original.
APA, Harvard, Vancouver, ISO, and other styles
7

Cao, Fang, Jiayi Sun, Xiangyang Luo, Chuan Qin, and Ching-Chun Chang. "Privacy-preserving inpainting for outsourced image." International Journal of Distributed Sensor Networks 17, no. 11 (2021): 155014772110590. http://dx.doi.org/10.1177/15501477211059092.

Full text
Abstract:
In this article, a framework of privacy-preserving inpainting for outsourced image and an encrypted-image inpainting scheme are proposed. Different with conventional image inpainting in plaintext domain, there are two entities, that is, content owner and image restorer, in our framework. Content owner first encrypts his or her damaged image for privacy protection and outsources the encrypted, damaged image to image restorer, who may be a cloud server with powerful computation capability. Image restorer performs inpainting in encrypted domain and sends the inpainted and encrypted image back to
APA, Harvard, Vancouver, ISO, and other styles
8

Jena, Riyanka, Priyanka Singh, and Manoranjan Mohanty. "PP-JPEG: A Privacy-Preserving JPEG Image-Tampering Localization." Journal of Imaging 9, no. 9 (2023): 172. http://dx.doi.org/10.3390/jimaging9090172.

Full text
Abstract:
The widespread availability of digital image-processing software has given rise to various forms of image manipulation and forgery, which can pose a significant challenge in different fields, such as law enforcement, journalism, etc. It can also lead to privacy concerns. We are proposing that a privacy-preserving framework to encrypt images before processing them is vital to maintain the privacy and confidentiality of sensitive images, especially those used for the purpose of investigation. To address these challenges, we propose a novel solution that detects image forgeries while preserving t
APA, Harvard, Vancouver, ISO, and other styles
9

Husain‎, Saba Mohammed. "New Encrypted Steganography Approach." JOURNAL OF UNIVERSITY OF BABYLON for Pure and Applied Sciences 26, no. 2 (2017): 36–46. http://dx.doi.org/10.29196/jub.v26i2.472.

Full text
Abstract:
The proposed research Provides an approach for hiding an encrypted text in side a digital image. Where the text is encrypted in a complex manner used method of PlayFair to encrypt clear text and to increase security put lettering ciphertext on the geometric shape clockwise and then we write the ciphertext output in the form of lines, taken new ciphertext and converted to Ascii code and then to binary and hidden text in bits least importance in the picture. The results were good by PNSR scale
APA, Harvard, Vancouver, ISO, and other styles
10

Perillo, Angelo Massimo, Giuseppe Persiano, and Alberto Trombetta. "Secure Selections on Encrypted Multi-writer Streams." ACM Transactions on Privacy and Security 25, no. 1 (2022): 1–33. http://dx.doi.org/10.1145/3485470.

Full text
Abstract:
Performing searches over encrypted data is a very current and active area. Several efficient solutions have been provided for the single-writer scenario in which all sensitive data originate with one party (the Data Owner ) that encrypts and uploads the data to a public repository. Subsequently, the Data Owner accesses the encrypted data through a Query Processor , which has direct access to the public encrypted repository. Motivated by the recent trend in pervasive data collection, we depart from this model and consider a multi-writer scenario in which the data originate with several and mutu
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Encrypted"

1

Rosén, Oskar. "Encrypted Chat Client : Encrypted communication over XMPP." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-177499.

Full text
Abstract:
Every day there are internet users all over the world who sends a total sum of millions of emails and instant messages and a majority of these are sent and transmitted without any form of encryption. When we send an unencrypted message it can be monitored, analyzed and even stored by organiza-tions and individuals. Therefore using encrypted communication is vital for not having our privacy violated. One of the problems that needs to be solved is to allow two persons to communicate in (near) real time through text over internet in a secure and easy way for the user, while at the same time allow
APA, Harvard, Vancouver, ISO, and other styles
2

Brekne, Tønnes. "Encrypted Computation." Doctoral thesis, Norwegian University of Science and Technology, Faculty of Information Technology, Mathematics and Electrical Engineering, 2001. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-27.

Full text
Abstract:
<p>The ability to construct software, call it a functional ciphertext, which can be remotely executed in encrypted form as an entirely self-contained unit, has the potential for some interesting applications. One such application is the construction of autonomous mobile agents capable of entering into certain types of legally binding contracts on behalf of the sender. At a premium in such circumstances is the ability to protect secret cryptographic keys or other secret information, which typically is necessary for legally binding contracts. Also important is the ability to do powerful computat
APA, Harvard, Vancouver, ISO, and other styles
3

Moataz, Tarik. "Searching over encrypted data." Thesis, Télécom Bretagne, 2016. http://www.theses.fr/2016TELB0418/document.

Full text
Abstract:
Les services cloud offrent des coûts réduits, une élasticité et un espace de stockage illimité qui attirent de nombreux utilisateurs. Le partage de fichiers, les plates-formes collaboratives, les plateformes de courrier électroniques, les serveurs de sauvegarde et le stockage de fichiers sont parmi les services qui font du cloud un outil essentiel pour une utilisation quotidienne. Actuellement, la plupart des systèmes d'exploitation proposent des applications de stockage externalisées intégrées, par conception, telles que One Drive et iCloud, en tant que substituts naturels succédant au stocka
APA, Harvard, Vancouver, ISO, and other styles
4

Brinkman, Richard. "Searching in encrypted data." Enschede : University of Twente [Host], 2007. http://doc.utwente.nl/57878.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Reid, Eric. "ENCRYPTED CORRELATING SOURCE SELECTOR." International Foundation for Telemetering, 2006. http://hdl.handle.net/10150/604265.

Full text
Abstract:
ITC/USA 2006 Conference Proceedings / The Forty-Second Annual International Telemetering Conference and Technical Exhibition / October 23-26, 2006 / Town and Country Resort & Convention Center, San Diego, California<br>Modern telemetry and data streams are often encrypted. The majority of range testing activities require multiple ground stations to collect these streams and send them to a central processing location. Each of these streams currently needs to be individually decrypted before best source selection, processing and analysis. Using innovative techniques, it is possible to time c
APA, Harvard, Vancouver, ISO, and other styles
6

Tran, Augustin. "Encrypted Collaborative Editing Software." Thesis, University of North Texas, 2020. https://digital.library.unt.edu/ark:/67531/metadc1703311/.

Full text
Abstract:
Cloud-based collaborative editors enable real-time document processing via remote connections. Their common application is to allow Internet users to collaboratively work on their documents stored in the cloud, even if these users are physically a world apart. However, this convenience comes at a cost in terms of user privacy. Hence, the growth of popularity of cloud computing application stipulates the growth in importance of cloud security. A major concern with the cloud is who has access to user data. In order to address this issue, various third-party services offer encryption mechanisms f
APA, Harvard, Vancouver, ISO, and other styles
7

Izadinia, Vafa Dario. "Fingerprinting Encrypted Tunnel Endpoints." Diss., University of Pretoria, 2005. http://hdl.handle.net/2263/25351.

Full text
Abstract:
Operating System fingerprinting is a reconnaissance method used by Whitehats and Blackhats alike. Current techniques for fingerprinting do not take into account tunneling protocols, such as IPSec, SSL/TLS, and SSH, which effectively `wrap` network traffic in a ciphertext mantle, thus potentially rendering passive monitoring ineffectual. Whether encryption makes VPN tunnel endpoints immune to fingerprinting, or yields the encrypted contents of the VPN tunnel entirely indistinguishable, is a topic that has received modest coverage in academic literature. This study addresses these question by ta
APA, Harvard, Vancouver, ISO, and other styles
8

Ramkumar, Bhuvaneswari. "Encrypted mal-ware detection." [Ames, Iowa : Iowa State University], 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Guadiana, Juan M., and Fil Macias. "ENCRYPTED BIT ERROR RATE TESTING." International Foundation for Telemetering, 2002. http://hdl.handle.net/10150/607507.

Full text
Abstract:
International Telemetering Conference Proceedings / October 21, 2002 / Town & Country Hotel and Conference Center, San Diego, California<br>End-to-End testing is a tool for verifying that Range Telemetry (TM) System Equipment will deliver satisfactory performance throughout a planned flight test. A thorough test verifies system thresholds while gauging projected mission loading all in the presence of expected interference. At the White Sands Missile Range (WSMR) in New Mexico, system tests are routinely conducted by Range telemetry Engineers and technicians in the interest of ensuring highly r
APA, Harvard, Vancouver, ISO, and other styles
10

Deng, Mo Ph D. Massachusetts Institute of Technology. "On compression of encrypted data." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/106100.

Full text
Abstract:
Thesis: S.M. in Electrical Engineering, Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2016.<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (pages 93-96).<br>In this thesis, I took advantage of a model-free compression architecture, where the encoder only makes decision about coding and leaves to the decoder to apply the knowledge of the source for decoding, to attack the problem of compressing encrypted data. Results for compressing different sources encrypted by different class of ciphers are shown and analyz
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Encrypted"

1

Orman, Hilarie. Encrypted Email. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-21344-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Watson, Samuel Wagan. Smoke encrypted whispers. University of Queensland Press, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Blinn, Eric. SQL Server Always Encrypted. Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5565-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Cherukuri, Aswani Kumar, Sumaiya Thaseen Ikram, Gang Li, and Xiao Liu. Encrypted Network Traffic Analysis. Springer International Publishing, 2024. http://dx.doi.org/10.1007/978-3-031-62909-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Siglind, Bruhn, ed. Encrypted messages in Alban Berg's music. Garland Pub., 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Wen, Mi, Rongxing Lu, Xiaohui Liang, Jingsheng Lei, and Xuemin Shen. Querying over Encrypted Data in Smart Grids. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-06355-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Manz, Olaf. Encrypt, Sign, Attack. Springer Berlin Heidelberg, 2022. http://dx.doi.org/10.1007/978-3-662-66015-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Moseley, V. J. "Jon", Andreas Lampropoulos, Eftychia Apostolidi, and Christos Giarlelis. Characteristic Seismic Failures of Buildings. Edited by Stephanos E. Dritsos. International Association for Bridge and Structural Engineering (IABSE), 2019. http://dx.doi.org/10.2749/sed016.

Full text
Abstract:
&lt;p&gt;Earthquakes can cause considerable fatalities, injuries and financial loss. The forces of nature cannot be blamed, as the problem lies with the structures in seismic regions that may not have been designed or constructed to a sufficient degree to resist earthquake actions or they may have design flaws. This Structural Engineering Document (SED) concerns reinforced concrete and masonry buildings together with geotechnical aspects and presents in a concise and practical way the state of the art of current understanding of building failures due to earthquakes. It classifies the different
APA, Harvard, Vancouver, ISO, and other styles
9

McCray, Carolyn. Encrypted. Amazon Publishing, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Deveaux, Davanya S. Encrypted. Lulu Press, Inc., 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Encrypted"

1

Orman, Hilarie. "Introduction: What Is Secure Email?" In Encrypted Email. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-21344-6_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Orman, Hilarie. "A Brief History of Secure Email." In Encrypted Email. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-21344-6_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Orman, Hilarie. "How Does Secure Email Work?" In Encrypted Email. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-21344-6_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Orman, Hilarie. "Using Secure Email." In Encrypted Email. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-21344-6_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Orman, Hilarie. "Living with Encrypted Email." In Encrypted Email. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-21344-6_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Orman, Hilarie. "Conclusion." In Encrypted Email. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-21344-6_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Colilli, Paul. "Encrypted Signs." In The Angel's Corpse. Palgrave Macmillan US, 1999. http://dx.doi.org/10.1057/9780312299668_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Weik, Martin H. "encrypted text." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_6161.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Weik, Martin H. "encrypted voice." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_6162.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Cheng, Rong, Bo Zhang, and Fangguo Zhang. "Secure Obfuscation of Encrypted Verifiable Encrypted Signatures." In Provable Security. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24316-5_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Encrypted"

1

Adamek, Janis, Philipp Binfet, Nils Schlüter, and Moritz Schulze Darup. "Encrypted system identification as-a-service via reliable encrypted matrix inversion." In 2024 IEEE 63rd Conference on Decision and Control (CDC). IEEE, 2024. https://doi.org/10.1109/cdc56724.2024.10886076.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chen, Wei, Danhao Wang, Yang Kang, et al. "Achieving Bipolar Photoresponse in III-Nitride Nanowires for Encrypted Optical Communication." In CLEO: Applications and Technology. Optica Publishing Group, 2024. http://dx.doi.org/10.1364/cleo_at.2024.atu4j.1.

Full text
Abstract:
We construct a spectral-distinctive photodetector based on p-AlGaN/n-Si nanowires modified with carbon layer, where the carbon layer effectively regulates the surface band bending of the nanowires, further successfully applying to the encrypted optical communication system. Key words: III-nitride nanowires, bipolar photoresponse, encrypted optical communication, surface band bending
APA, Harvard, Vancouver, ISO, and other styles
3

Aneja, Sandhya, and Nagender Aneja. "Fingerprinting Browsers in Encrypted Communications." In 2024 IEEE 15th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON). IEEE, 2024. http://dx.doi.org/10.1109/uemcon62879.2024.10754712.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Marañón, José Armando Tesén, and Romaric Duvignau. "Classifying 5G Encrypted Packet Traces." In 2024 International Conference on Electrical, Communication and Computer Engineering (ICECCE). IEEE, 2024. https://doi.org/10.1109/icecce63537.2024.10823417.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Gui, Zichen, Oliver Johnson, and Bogdan Warinschi. "Encrypted Databases." In CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2019. http://dx.doi.org/10.1145/3319535.3363210.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ohtaki, Y. "Constructing a searchable encrypted log using encrypted inverted indexes." In 2005 International Conference on Cyberworlds (CW'05). IEEE, 2005. http://dx.doi.org/10.1109/cw.2005.33.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kashyap, Sachin, and Kannan Karthik. "Authenticating encrypted data." In 2011 National Conference on Communications (NCC). IEEE, 2011. http://dx.doi.org/10.1109/ncc.2011.5734696.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Zhuravlev, Dmytro, Ihor Samoilovych, Roman Orlovskyi, Ievgen Bondarenko, and Yaroslav Lavrenyuk. "Encrypted Program Execution." In 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2014. http://dx.doi.org/10.1109/trustcom.2014.108.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Arasu, A., K. Eguro, R. Kaushik, and R. Ramamurthy. "Querying encrypted data." In 2013 29th IEEE International Conference on Data Engineering (ICDE 2013). IEEE, 2013. http://dx.doi.org/10.1109/icde.2013.6544919.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Barni, Mauro. "Processing encrypted signals." In Proceeding of the 8th workshop. ACM Press, 2006. http://dx.doi.org/10.1145/1161366.1161367.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Encrypted"

1

Thomson, M. Encrypted Content-Encoding for HTTP. RFC Editor, 2017. http://dx.doi.org/10.17487/rfc8188.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Cook, Paul, David Legare, David Hummel, John Malowicki, David H. Hughes, and Reinhard Erdmann. Investigating Quantum Data Encrypted Modulation States. Defense Technical Information Center, 2014. http://dx.doi.org/10.21236/ada615446.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Goldwasser, Shafi, and Vinod Vaikuntanathan. Computing on Encrypted Data: Theory and Application. Defense Technical Information Center, 2016. http://dx.doi.org/10.21236/ad1002618.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Pouliot, David. Balancing Security, Performance and Deployability in Encrypted Search. Portland State University Library, 2020. http://dx.doi.org/10.15760/etd.7297.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Silverberg, Alice. Making Computing on Encrypted Data Secure and Practical. Defense Technical Information Center, 2013. http://dx.doi.org/10.21236/ada586876.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jennings, C., J. Mattsson, D. McGrew, D. Wing, and F. Andreasen. Encrypted Key Transport for DTLS and Secure RTP. RFC Editor, 2021. http://dx.doi.org/10.17487/rfc8870.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Galvin, J., S. Murphy, S. Crocker, and N. Freed. Security Multiparts for MIME: Multipart/Signed and Multipart/Encrypted. RFC Editor, 1995. http://dx.doi.org/10.17487/rfc1847.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Turner, S., and R. Housley. Cryptographic Message Syntax (CMS) Encrypted Key Package Content Type. RFC Editor, 2010. http://dx.doi.org/10.17487/rfc6032.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Keranen, A. Encrypted Signaling Transport Modes for the Host Identity Protocol. RFC Editor, 2011. http://dx.doi.org/10.17487/rfc6261.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Turner, S. Algorithms for Cryptographic Message Syntax (CMS) Encrypted Key Package Content Type. RFC Editor, 2010. http://dx.doi.org/10.17487/rfc6033.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!