Gotowa bibliografia na temat „Encrypted”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Encrypted”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "Encrypted"

1

Sonawane, Supriya S., and N. M. Shahane. "Separable Encrypted Data Embedding in Encrypted Image with Large Data Embedding Capacity." COMPUSOFT: An International Journal of Advanced Computer Technology 03, no. 06 (2014): 873–78. https://doi.org/10.5281/zenodo.14742667.

Pełny tekst źródła
Streszczenie:
This paper proposes a novel scheme of separable encrypted data embedding in encrypted image with large data embedding capacity. An image encrypts using cryptography algorithm and secret data encrypts using hybrid cryptography. Then, the encrypted secret data can be successfully embedded in the encrypted cover image using Modified BPCS steganography. An encrypted image containing encrypted data is sent. At the receiver side, with an encrypted image containing embedded encrypted data, if a receiver has the data hiding key and data encryption key then he is only able to extract the encrypted and
Style APA, Harvard, Vancouver, ISO itp.
2

Haggag, Ayman, Mohamed Ghoneim, Jianming Lu, and Takashi Yahagi. "Access Control and Scalable Encryption Using a Stream Cipher for JPEG 2000 Encoded Images." Journal of Advanced Computational Intelligence and Intelligent Informatics 11, no. 7 (2007): 728–34. http://dx.doi.org/10.20965/jaciii.2007.p0728.

Pełny tekst źródła
Streszczenie:
The access control and scalable encryption scheme we propose for JPEG 2000 encoded images encrypts JEPG 2000 codestreams using the SNOW 2 progressive encryption algorithm to encrypt resolutions, quality layers, or packets independently to provide resolution, quality or fine-grain scalability. Access is controlled to different image resolutions or quality levels granted to different users receiving the same encrypted JPEG 2000 codestream but having different decryption keys. Keys used with successive resolutions or quality layers are mutually dependent based on the SHA-256 one-way hashing funct
Style APA, Harvard, Vancouver, ISO itp.
3

Hamano, Genki, Shoko Imaizumi, and Hitoshi Kiya. "Effects of JPEG Compression on Vision Transformer Image Classification for Encryption-then-Compression Images." Sensors 23, no. 7 (2023): 3400. http://dx.doi.org/10.3390/s23073400.

Pełny tekst źródła
Streszczenie:
This paper evaluates the effects of JPEG compression on image classification using the Vision Transformer (ViT). In recent years, many studies have been carried out to classify images in the encrypted domain for privacy preservation. Previously, the authors proposed an image classification method that encrypts both a trained ViT model and test images. Here, an encryption-then-compression system was employed to encrypt the test images, and the ViT model was preliminarily trained by plain images. The classification accuracy in the previous method was exactly equal to that without any encryption
Style APA, Harvard, Vancouver, ISO itp.
4

Hussien, Nadia, Nadia Mahmood Hussien, Saba Abdulbaqi Salman, and Mohammad Aljanabi. "Secure Federated Learning with a Homomorphic Encryption Model." International Journal Papier Advance and Scientific Review 4, no. 3 (2023): 1–7. http://dx.doi.org/10.47667/ijpasr.v4i3.235.

Pełny tekst źródła
Streszczenie:
Federated learning (FL) offers collaborative machine learning across decentralized devices while safeguarding data privacy. However, data security and privacy remain key concerns. This paper introduces "Secure Federated Learning with a Homomorphic Encryption Model," addressing these challenges by integrating homomorphic encryption into FL. The model starts by initializing a global machine learning model and generating a homomorphic encryption key pair, with the public key shared among FL participants. Using this public key, participants then collect, preprocess, and encrypt their local data. D
Style APA, Harvard, Vancouver, ISO itp.
5

Luu Hong Dung, Nguyen Vinh Thai, Nguyen Kim Thanh, and Pham Van Hiep. "A method for constructing public - key block cipher schemes based on discrete logarithm problem." Journal of Military Science and Technology, CSCE7 (December 30, 2023): 15–26. http://dx.doi.org/10.54939/1859-1043.j.mst.csce7.2023.15-26.

Pełny tekst źródła
Streszczenie:
The paper proposes a method for constructing block cipher schemes that enables verifying the source and integrity of the encrypted message. Additionally, the shared secret key between the sender/encryptor and the receiver/decryptor for each encrypted message is established based on the mechanism of public key cryptography.
Style APA, Harvard, Vancouver, ISO itp.
6

Naik, Mr Shiva Kumar R., Kshitij Yadav, Hari Om yadav, Niha C. Gowda, and Mounika. "Data Recovery from Encrypted Image and Recovering Image." International Journal of Engineering and Advanced Technology 8, no. 5s (2019): 76–79. http://dx.doi.org/10.35940/ijeat.e1016.0585s19.

Pełny tekst źródła
Streszczenie:
This paper refers to the data hiding technique in an encrypted image and restoring image as it was before to its fullest. There are three bids of the framework to this process, which are a content owner, data hiding and recipient. The content owner encrypts the image with ciphertext making it an encrypted image. Data hider channelizes encrypted image into 3 different channels and adds each with additional bits in order to obtain marked encrypted image. At the recipient end, the noise from the image could be removed consuming the extraction key and the image obtained will be intact as original.
Style APA, Harvard, Vancouver, ISO itp.
7

Cao, Fang, Jiayi Sun, Xiangyang Luo, Chuan Qin, and Ching-Chun Chang. "Privacy-preserving inpainting for outsourced image." International Journal of Distributed Sensor Networks 17, no. 11 (2021): 155014772110590. http://dx.doi.org/10.1177/15501477211059092.

Pełny tekst źródła
Streszczenie:
In this article, a framework of privacy-preserving inpainting for outsourced image and an encrypted-image inpainting scheme are proposed. Different with conventional image inpainting in plaintext domain, there are two entities, that is, content owner and image restorer, in our framework. Content owner first encrypts his or her damaged image for privacy protection and outsources the encrypted, damaged image to image restorer, who may be a cloud server with powerful computation capability. Image restorer performs inpainting in encrypted domain and sends the inpainted and encrypted image back to
Style APA, Harvard, Vancouver, ISO itp.
8

Jena, Riyanka, Priyanka Singh, and Manoranjan Mohanty. "PP-JPEG: A Privacy-Preserving JPEG Image-Tampering Localization." Journal of Imaging 9, no. 9 (2023): 172. http://dx.doi.org/10.3390/jimaging9090172.

Pełny tekst źródła
Streszczenie:
The widespread availability of digital image-processing software has given rise to various forms of image manipulation and forgery, which can pose a significant challenge in different fields, such as law enforcement, journalism, etc. It can also lead to privacy concerns. We are proposing that a privacy-preserving framework to encrypt images before processing them is vital to maintain the privacy and confidentiality of sensitive images, especially those used for the purpose of investigation. To address these challenges, we propose a novel solution that detects image forgeries while preserving t
Style APA, Harvard, Vancouver, ISO itp.
9

Husain‎, Saba Mohammed. "New Encrypted Steganography Approach." JOURNAL OF UNIVERSITY OF BABYLON for Pure and Applied Sciences 26, no. 2 (2017): 36–46. http://dx.doi.org/10.29196/jub.v26i2.472.

Pełny tekst źródła
Streszczenie:
The proposed research Provides an approach for hiding an encrypted text in side a digital image. Where the text is encrypted in a complex manner used method of PlayFair to encrypt clear text and to increase security put lettering ciphertext on the geometric shape clockwise and then we write the ciphertext output in the form of lines, taken new ciphertext and converted to Ascii code and then to binary and hidden text in bits least importance in the picture. The results were good by PNSR scale
Style APA, Harvard, Vancouver, ISO itp.
10

Perillo, Angelo Massimo, Giuseppe Persiano, and Alberto Trombetta. "Secure Selections on Encrypted Multi-writer Streams." ACM Transactions on Privacy and Security 25, no. 1 (2022): 1–33. http://dx.doi.org/10.1145/3485470.

Pełny tekst źródła
Streszczenie:
Performing searches over encrypted data is a very current and active area. Several efficient solutions have been provided for the single-writer scenario in which all sensitive data originate with one party (the Data Owner ) that encrypts and uploads the data to a public repository. Subsequently, the Data Owner accesses the encrypted data through a Query Processor , which has direct access to the public encrypted repository. Motivated by the recent trend in pervasive data collection, we depart from this model and consider a multi-writer scenario in which the data originate with several and mutu
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Rozprawy doktorskie na temat "Encrypted"

1

Rosén, Oskar. "Encrypted Chat Client : Encrypted communication over XMPP." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-177499.

Pełny tekst źródła
Streszczenie:
Every day there are internet users all over the world who sends a total sum of millions of emails and instant messages and a majority of these are sent and transmitted without any form of encryption. When we send an unencrypted message it can be monitored, analyzed and even stored by organiza-tions and individuals. Therefore using encrypted communication is vital for not having our privacy violated. One of the problems that needs to be solved is to allow two persons to communicate in (near) real time through text over internet in a secure and easy way for the user, while at the same time allow
Style APA, Harvard, Vancouver, ISO itp.
2

Brekne, Tønnes. "Encrypted Computation." Doctoral thesis, Norwegian University of Science and Technology, Faculty of Information Technology, Mathematics and Electrical Engineering, 2001. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-27.

Pełny tekst źródła
Streszczenie:
<p>The ability to construct software, call it a functional ciphertext, which can be remotely executed in encrypted form as an entirely self-contained unit, has the potential for some interesting applications. One such application is the construction of autonomous mobile agents capable of entering into certain types of legally binding contracts on behalf of the sender. At a premium in such circumstances is the ability to protect secret cryptographic keys or other secret information, which typically is necessary for legally binding contracts. Also important is the ability to do powerful computat
Style APA, Harvard, Vancouver, ISO itp.
3

Moataz, Tarik. "Searching over encrypted data." Thesis, Télécom Bretagne, 2016. http://www.theses.fr/2016TELB0418/document.

Pełny tekst źródła
Streszczenie:
Les services cloud offrent des coûts réduits, une élasticité et un espace de stockage illimité qui attirent de nombreux utilisateurs. Le partage de fichiers, les plates-formes collaboratives, les plateformes de courrier électroniques, les serveurs de sauvegarde et le stockage de fichiers sont parmi les services qui font du cloud un outil essentiel pour une utilisation quotidienne. Actuellement, la plupart des systèmes d'exploitation proposent des applications de stockage externalisées intégrées, par conception, telles que One Drive et iCloud, en tant que substituts naturels succédant au stocka
Style APA, Harvard, Vancouver, ISO itp.
4

Brinkman, Richard. "Searching in encrypted data." Enschede : University of Twente [Host], 2007. http://doc.utwente.nl/57878.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Reid, Eric. "ENCRYPTED CORRELATING SOURCE SELECTOR." International Foundation for Telemetering, 2006. http://hdl.handle.net/10150/604265.

Pełny tekst źródła
Streszczenie:
ITC/USA 2006 Conference Proceedings / The Forty-Second Annual International Telemetering Conference and Technical Exhibition / October 23-26, 2006 / Town and Country Resort & Convention Center, San Diego, California<br>Modern telemetry and data streams are often encrypted. The majority of range testing activities require multiple ground stations to collect these streams and send them to a central processing location. Each of these streams currently needs to be individually decrypted before best source selection, processing and analysis. Using innovative techniques, it is possible to time c
Style APA, Harvard, Vancouver, ISO itp.
6

Tran, Augustin. "Encrypted Collaborative Editing Software." Thesis, University of North Texas, 2020. https://digital.library.unt.edu/ark:/67531/metadc1703311/.

Pełny tekst źródła
Streszczenie:
Cloud-based collaborative editors enable real-time document processing via remote connections. Their common application is to allow Internet users to collaboratively work on their documents stored in the cloud, even if these users are physically a world apart. However, this convenience comes at a cost in terms of user privacy. Hence, the growth of popularity of cloud computing application stipulates the growth in importance of cloud security. A major concern with the cloud is who has access to user data. In order to address this issue, various third-party services offer encryption mechanisms f
Style APA, Harvard, Vancouver, ISO itp.
7

Izadinia, Vafa Dario. "Fingerprinting Encrypted Tunnel Endpoints." Diss., University of Pretoria, 2005. http://hdl.handle.net/2263/25351.

Pełny tekst źródła
Streszczenie:
Operating System fingerprinting is a reconnaissance method used by Whitehats and Blackhats alike. Current techniques for fingerprinting do not take into account tunneling protocols, such as IPSec, SSL/TLS, and SSH, which effectively `wrap` network traffic in a ciphertext mantle, thus potentially rendering passive monitoring ineffectual. Whether encryption makes VPN tunnel endpoints immune to fingerprinting, or yields the encrypted contents of the VPN tunnel entirely indistinguishable, is a topic that has received modest coverage in academic literature. This study addresses these question by ta
Style APA, Harvard, Vancouver, ISO itp.
8

Ramkumar, Bhuvaneswari. "Encrypted mal-ware detection." [Ames, Iowa : Iowa State University], 2008.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Guadiana, Juan M., and Fil Macias. "ENCRYPTED BIT ERROR RATE TESTING." International Foundation for Telemetering, 2002. http://hdl.handle.net/10150/607507.

Pełny tekst źródła
Streszczenie:
International Telemetering Conference Proceedings / October 21, 2002 / Town & Country Hotel and Conference Center, San Diego, California<br>End-to-End testing is a tool for verifying that Range Telemetry (TM) System Equipment will deliver satisfactory performance throughout a planned flight test. A thorough test verifies system thresholds while gauging projected mission loading all in the presence of expected interference. At the White Sands Missile Range (WSMR) in New Mexico, system tests are routinely conducted by Range telemetry Engineers and technicians in the interest of ensuring highly r
Style APA, Harvard, Vancouver, ISO itp.
10

Deng, Mo Ph D. Massachusetts Institute of Technology. "On compression of encrypted data." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/106100.

Pełny tekst źródła
Streszczenie:
Thesis: S.M. in Electrical Engineering, Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2016.<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (pages 93-96).<br>In this thesis, I took advantage of a model-free compression architecture, where the encoder only makes decision about coding and leaves to the decoder to apply the knowledge of the source for decoding, to attack the problem of compressing encrypted data. Results for compressing different sources encrypted by different class of ciphers are shown and analyz
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Książki na temat "Encrypted"

1

Orman, Hilarie. Encrypted Email. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-21344-6.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Watson, Samuel Wagan. Smoke encrypted whispers. University of Queensland Press, 2004.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Blinn, Eric. SQL Server Always Encrypted. Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5565-0.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Cherukuri, Aswani Kumar, Sumaiya Thaseen Ikram, Gang Li, and Xiao Liu. Encrypted Network Traffic Analysis. Springer International Publishing, 2024. http://dx.doi.org/10.1007/978-3-031-62909-9.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Siglind, Bruhn, ed. Encrypted messages in Alban Berg's music. Garland Pub., 1998.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Wen, Mi, Rongxing Lu, Xiaohui Liang, Jingsheng Lei, and Xuemin Shen. Querying over Encrypted Data in Smart Grids. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-06355-3.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Manz, Olaf. Encrypt, Sign, Attack. Springer Berlin Heidelberg, 2022. http://dx.doi.org/10.1007/978-3-662-66015-7.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Moseley, V. J. "Jon", Andreas Lampropoulos, Eftychia Apostolidi, and Christos Giarlelis. Characteristic Seismic Failures of Buildings. Edited by Stephanos E. Dritsos. International Association for Bridge and Structural Engineering (IABSE), 2019. http://dx.doi.org/10.2749/sed016.

Pełny tekst źródła
Streszczenie:
&lt;p&gt;Earthquakes can cause considerable fatalities, injuries and financial loss. The forces of nature cannot be blamed, as the problem lies with the structures in seismic regions that may not have been designed or constructed to a sufficient degree to resist earthquake actions or they may have design flaws. This Structural Engineering Document (SED) concerns reinforced concrete and masonry buildings together with geotechnical aspects and presents in a concise and practical way the state of the art of current understanding of building failures due to earthquakes. It classifies the different
Style APA, Harvard, Vancouver, ISO itp.
9

McCray, Carolyn. Encrypted. Amazon Publishing, 2013.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Deveaux, Davanya S. Encrypted. Lulu Press, Inc., 2016.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Części książek na temat "Encrypted"

1

Orman, Hilarie. "Introduction: What Is Secure Email?" In Encrypted Email. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-21344-6_1.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Orman, Hilarie. "A Brief History of Secure Email." In Encrypted Email. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-21344-6_2.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Orman, Hilarie. "How Does Secure Email Work?" In Encrypted Email. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-21344-6_3.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Orman, Hilarie. "Using Secure Email." In Encrypted Email. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-21344-6_4.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Orman, Hilarie. "Living with Encrypted Email." In Encrypted Email. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-21344-6_5.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Orman, Hilarie. "Conclusion." In Encrypted Email. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-21344-6_6.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Colilli, Paul. "Encrypted Signs." In The Angel's Corpse. Palgrave Macmillan US, 1999. http://dx.doi.org/10.1057/9780312299668_9.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Weik, Martin H. "encrypted text." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_6161.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Weik, Martin H. "encrypted voice." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_6162.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Cheng, Rong, Bo Zhang, and Fangguo Zhang. "Secure Obfuscation of Encrypted Verifiable Encrypted Signatures." In Provable Security. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24316-5_14.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "Encrypted"

1

Adamek, Janis, Philipp Binfet, Nils Schlüter, and Moritz Schulze Darup. "Encrypted system identification as-a-service via reliable encrypted matrix inversion." In 2024 IEEE 63rd Conference on Decision and Control (CDC). IEEE, 2024. https://doi.org/10.1109/cdc56724.2024.10886076.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Chen, Wei, Danhao Wang, Yang Kang, et al. "Achieving Bipolar Photoresponse in III-Nitride Nanowires for Encrypted Optical Communication." In CLEO: Applications and Technology. Optica Publishing Group, 2024. http://dx.doi.org/10.1364/cleo_at.2024.atu4j.1.

Pełny tekst źródła
Streszczenie:
We construct a spectral-distinctive photodetector based on p-AlGaN/n-Si nanowires modified with carbon layer, where the carbon layer effectively regulates the surface band bending of the nanowires, further successfully applying to the encrypted optical communication system. Key words: III-nitride nanowires, bipolar photoresponse, encrypted optical communication, surface band bending
Style APA, Harvard, Vancouver, ISO itp.
3

Aneja, Sandhya, and Nagender Aneja. "Fingerprinting Browsers in Encrypted Communications." In 2024 IEEE 15th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON). IEEE, 2024. http://dx.doi.org/10.1109/uemcon62879.2024.10754712.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Marañón, José Armando Tesén, and Romaric Duvignau. "Classifying 5G Encrypted Packet Traces." In 2024 International Conference on Electrical, Communication and Computer Engineering (ICECCE). IEEE, 2024. https://doi.org/10.1109/icecce63537.2024.10823417.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Gui, Zichen, Oliver Johnson, and Bogdan Warinschi. "Encrypted Databases." In CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2019. http://dx.doi.org/10.1145/3319535.3363210.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Ohtaki, Y. "Constructing a searchable encrypted log using encrypted inverted indexes." In 2005 International Conference on Cyberworlds (CW'05). IEEE, 2005. http://dx.doi.org/10.1109/cw.2005.33.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Kashyap, Sachin, and Kannan Karthik. "Authenticating encrypted data." In 2011 National Conference on Communications (NCC). IEEE, 2011. http://dx.doi.org/10.1109/ncc.2011.5734696.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Zhuravlev, Dmytro, Ihor Samoilovych, Roman Orlovskyi, Ievgen Bondarenko, and Yaroslav Lavrenyuk. "Encrypted Program Execution." In 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2014. http://dx.doi.org/10.1109/trustcom.2014.108.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Arasu, A., K. Eguro, R. Kaushik, and R. Ramamurthy. "Querying encrypted data." In 2013 29th IEEE International Conference on Data Engineering (ICDE 2013). IEEE, 2013. http://dx.doi.org/10.1109/icde.2013.6544919.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Barni, Mauro. "Processing encrypted signals." In Proceeding of the 8th workshop. ACM Press, 2006. http://dx.doi.org/10.1145/1161366.1161367.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Raporty organizacyjne na temat "Encrypted"

1

Thomson, M. Encrypted Content-Encoding for HTTP. RFC Editor, 2017. http://dx.doi.org/10.17487/rfc8188.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Cook, Paul, David Legare, David Hummel, John Malowicki, David H. Hughes, and Reinhard Erdmann. Investigating Quantum Data Encrypted Modulation States. Defense Technical Information Center, 2014. http://dx.doi.org/10.21236/ada615446.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Goldwasser, Shafi, and Vinod Vaikuntanathan. Computing on Encrypted Data: Theory and Application. Defense Technical Information Center, 2016. http://dx.doi.org/10.21236/ad1002618.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Pouliot, David. Balancing Security, Performance and Deployability in Encrypted Search. Portland State University Library, 2020. http://dx.doi.org/10.15760/etd.7297.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Silverberg, Alice. Making Computing on Encrypted Data Secure and Practical. Defense Technical Information Center, 2013. http://dx.doi.org/10.21236/ada586876.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Jennings, C., J. Mattsson, D. McGrew, D. Wing, and F. Andreasen. Encrypted Key Transport for DTLS and Secure RTP. RFC Editor, 2021. http://dx.doi.org/10.17487/rfc8870.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Galvin, J., S. Murphy, S. Crocker, and N. Freed. Security Multiparts for MIME: Multipart/Signed and Multipart/Encrypted. RFC Editor, 1995. http://dx.doi.org/10.17487/rfc1847.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Turner, S., and R. Housley. Cryptographic Message Syntax (CMS) Encrypted Key Package Content Type. RFC Editor, 2010. http://dx.doi.org/10.17487/rfc6032.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Keranen, A. Encrypted Signaling Transport Modes for the Host Identity Protocol. RFC Editor, 2011. http://dx.doi.org/10.17487/rfc6261.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Turner, S. Algorithms for Cryptographic Message Syntax (CMS) Encrypted Key Package Content Type. RFC Editor, 2010. http://dx.doi.org/10.17487/rfc6033.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!