-
1Conference
Authors: Bharadwaj, S., Navaroj, G. Indra
Source: 2025 3rd International Conference on Self Sustainable Artificial Intelligence Systems (ICSSAS) Self Sustainable Artificial Intelligence Systems (ICSSAS), 2025 3rd International Conference on. :1896-1902 Jun, 2025
Relation: 2025 3rd International Conference on Self Sustainable Artificial Intelligence Systems (ICSSAS)
-
2Conference
Authors: Agnihotri, Prateek, Agarwal Mittal, Preeti
Source: 2023 International Conference on IoT, Communication and Automation Technology (ICICAT) IoT, Communication and Automation Technology (ICICAT), 2023 International Conference on. :1-8 Jun, 2023
Relation: 2023 International Conference on IoT, Communication and Automation Technology (ICICAT)
-
3Conference
Authors: Zhang, Yifan, Yu, Chaoyu, Wang, Yuqiang, Han, Junfei, Zhong, Ming, An, Haijun, Yuan, Ningping
Source: 2023 International Conference on Mechatronics, IoT and Industrial Informatics (ICMIII) ICMIII Mechatronics, IoT and Industrial Informatics (ICMIII), 2023 International Conference on. :143-147 Jun, 2023
Relation: 2023 International Conference on Mechatronics, IoT and Industrial Informatics (ICMIII)
-
4Conference
Authors: Syed, Dabeeruddin, Al-Ghushami, Abdullah Hussein, Zainab, Ameema, Abdulhamid, Shafii Muhammad, Al-Kuwari, Mohammed Salem Daen A
Source: 2023 IEEE 13th Annual Computing and Communication Workshop and Conference (CCWC) Computing and Communication Workshop and Conference (CCWC), 2023 IEEE 13th Annual. :0295-0300 Mar, 2023
Relation: 2023 IEEE 13th Annual Computing and Communication Workshop and Conference (CCWC)
-
5Conference
Source: 2021 4th International Iraqi Conference on Engineering Technology and Their Applications (IICETA) Engineering Technology and Their Applications (IICETA), 2021 4th International Iraqi Conference on. :264-269 Sep, 2021
Relation: 2021 4th International Iraqi Conference on Engineering Technology and Their Applications (IICETA)
-
6Conference
Authors: AlRoubiei, Mazoon, AlYarubi, Thuraiya, Kumar, Basant
Source: 2020 8th International Symposium on Digital Forensics and Security (ISDFS) Digital Forensics and Security (ISDFS), 2020 8th International Symposium on. :1-7 Jun, 2020
Relation: 2020 8th International Symposium on Digital Forensics and Security (ISDFS)
-
7eBook
Authors: AmanAff12, Aggarwal, Rajesh KumarAff12
Contributors: Kacprzyk, Janusz, Series EditorAff1, Gomide, Fernando, Advisory EditorAff2, Kaynak, Okyay, Advisory EditorAff3, Liu, Derong, Advisory EditorAff4, Pedrycz, Witold, Advisory EditorAff5, Polycarpou, Marios M., Advisory EditorAff6, Rudas, Imre J., Advisory EditorAff7, Wang, Jun, Advisory EditorAff8, Roy, Nihar Ranjan, editorAff9, Tanwar, Sudeep, editorAff10, Batra, Usha, editorAff11
Source: Cyber Security and Digital Forensics : Select Proceedings of the International Conference, ReDCySec 2023. 896:259-269
-
8Conference
Authors: Azizi, Sima, Komaee, Arash
Source: 2019 53rd Annual Conference on Information Sciences and Systems (CISS) Information Sciences and Systems (CISS), 2019 53rd Annual Conference on. :1-6 Mar, 2019
Relation: 2019 53rd Annual Conference on Information Sciences and Systems (CISS)
-
9Academic Journal
Contributors: Mazurek, Michelle, Sherr, Micah
Source: Proceedings on Privacy Enhancing Technologies, 2023 (1)
Subject Terms: Secure Multi-party Computation, 0301 basic medicine, Conjunctive and disjunctive queries, Encryption, Cryptographic primitive, Cryptographic protocol, Search engine, Mathematical analysis, Searchable Encryption, Database, 03 medical and health sciences, Cryptanalysis of Block Ciphers and Hash Functions, Theoretical computer science, Artificial Intelligence, Boolean function, FOS: Mathematics, Information retrieval, Relational database, Authenticated Encryption, Attribute-Based Encryption, Cryptography and Error-Correcting Codes, Scheme (mathematics), Computer network, 0303 health sciences, Advanced Cryptographic Schemes and Protocols, Symmetric-key algorithm, Query by Example, Scalability, Boolean conjunctive query, Public-key cryptography, Computer science, Conjunctive query, Distributed computing, Boolean queries, Algorithm, Database encryption, Searchable encryption, Encrypted search, Computer Science, Physical Sciences, Cryptography, Web search query, Homomorphic Encryption, Mathematics
File Description: application/application/pdf
Access URL: http://hdl.handle.net/20.500.11850/568666
-
10Academic Journal
Authors: Thales Bandiera Paiva, Routo Terada
Source: Transactions on Cryptographic Hardware and Embedded Systems, Vol 2022, Iss 4 (2022)
Subject Terms: LDPC, Computer engineering. Computer hardware, Post-quantum cryptography, Encryption, Key encapsulation, Information technology, 0102 computer and information sciences, 02 engineering and technology, Speech recognition, 01 natural sciences, TK7885-7895, Cryptanalysis of Block Ciphers and Hash Functions, NIST, constant-time decoding, Artificial Intelligence, 0202 electrical engineering, electronic engineering, information engineering, BIKE, Block Ciphers, Cryptography and Error-Correcting Codes, Computer network, Chaos-based Image Encryption Techniques, Symmetric-key algorithm, MDPC, Public-key cryptography, T58.5-58.64, Computer science, Programming language, Algorithm, Decoding Algorithms, Color Image Encryption, Computer Science, Physical Sciences, Cryptography, Computer Vision and Pattern Recognition, Decoding methods, Error-Correcting Codes, Constant (computer programming)
-
11Academic Journal
Source: IEEE Access, Vol 10, Pp 132908-132916 (2022)
Subject Terms: Encryption, 02 engineering and technology, Biochemistry, Quantum mechanics, Gene, Cryptanalysis of Block Ciphers and Hash Functions, Theoretical computer science, Artificial Intelligence, FOS: Mathematics, 0202 electrical engineering, electronic engineering, information engineering, Entropy (arrow of time), Cipher, Block cipher, fractional transformation, Cryptography and Error-Correcting Codes, Chaos-based Image Encryption Techniques, Symmetric-key algorithm, Physics, block cipher, Differential Cryptanalysis, image encryption, Public-key cryptography, Computer science, TK1-9971, Algorithm, substitution box, Chemistry, Operating system, Computer Science, Physical Sciences, Cryptography, Transformation (genetics), Electrical engineering. Electronics. Nuclear engineering, Computer Vision and Pattern Recognition, AES algorithm, S-box, Mathematics
-
12Conference
Authors: Kaushik, Akhil, Satvika, Gupta, Krishan, Kumar, Anant
Source: 2014 International Conference on Reliability Optimization and Information Technology (ICROIT) Optimization, Reliabilty, and Information Technology (ICROIT), 2014 International Conference on. :314-317 Feb, 2014
Relation: 2014 International Conference on Optimization, Reliabilty, and Information Technology (ICROIT)
-
13Conference
Authors: Zhu, Guangyu, Khan, Gul N.
Source: 2013 26th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE) Electrical and Computer Engineering (CCECE), 2013 26th Annual IEEE Canadian Conference on. :1-5 May, 2013
Relation: 2013 26th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE)
-
14Conference
Authors: Kaushik, Akhil, Kumar, Anant, Barnela, Manoj
Source: 2010 International Conference on Networking and Information Technology Networking and Information Technology (ICNIT), 2010 International Conference on. :381-385 Jun, 2010
Relation: 2010 International Conference on Networking and Information Technology (ICNIT 2010)
-
15Book
Authors: Amal Hafsa, Jihene Malek, Mohsen Machhout
Source: Lightweight Cryptographic Techniques and Cybersecurity Approaches ISBN: 9781803557328
Lightweight Cryptographic Techniques and Cybersecurity ApproachesSubject Terms: Image Encryption, Robustness (evolution), Encryption, Key encapsulation, Robust Hashing, Biochemistry, Gene, Cryptanalysis of Block Ciphers and Hash Functions, Theoretical computer science, Artificial Intelligence, Computer security, Computer engineering, Key (lock), Cryptosystem, Chaos-based Image Encryption Techniques, Digital Image Watermarking Techniques, Symmetric-key algorithm, Public-key cryptography, Hybrid cryptosystem, Computer science, Elliptic curve cryptography, Advanced Encryption Standard, Chemistry, Color Image Encryption, Image Authentication, Computer Science, Physical Sciences, Hash function, Optical Encryption, Cryptography, Computer Vision and Pattern Recognition
-
16Academic Journal
Authors: Saleh Ibrahim, Hesham Alhumyani, Mehedi Masud, Sultan S. Alshamrani, Omar Cheikhrouhou, Ghulam Muhammad, M. Shamim Hossain, Alaa M. Abbas
Source: IEEE Access, Vol 8, Pp 160433-160449 (2020)
Subject Terms: FOS: Computer and information sciences, Image Encryption, Artificial intelligence, Chaotic Maps, Chaotic, Hénon map, Ciphertext, Encryption, 02 engineering and technology, Cryptanalysis of Block Ciphers and Hash Functions, Theoretical computer science, Artificial Intelligence, Computer security, Image (mathematics), 0202 electrical engineering, electronic engineering, information engineering, Key (lock), Chaos-based Image Encryption Techniques, Symmetric-key algorithm, image encryption, Public-key cryptography, Plaintext, Computer science, Throughput, TK1-9971, Probabilistic encryption, Algorithm, Color Image Encryption, Applications of Elliptic Curve Cryptography in Security, Computer Science, Physical Sciences, Cryptography, Telecommunications, Wireless, Bijective substitution box, Computer vision, Electrical engineering. Electronics. Nuclear engineering, Computer Vision and Pattern Recognition, chaotic map, Information Systems
Linked Full TextAccess URL: https://ieeexplore.ieee.org/ielx7/6287639/8948470/09181562.pdf
https://doaj.org/article/429d53c764d04a58b1c6157ec1f123b8 -
17Academic Journal
Authors: Ngoc Nguyen, Loan Pham-Nguyen, Minh Nguyen, Georges Kaddoum
Source: IEEE Access, Vol 8, Pp 104432-104444 (2020)
Subject Terms: Artificial intelligence, random key, Chaotic, Encryption, security, 02 engineering and technology, Random number generation, Engineering, NIST, Computer security, Theory and Applications of Cellular Automata, 0202 electrical engineering, electronic engineering, information engineering, Key (lock), Computer network, Chaos-based Image Encryption Techniques, Symmetric-key algorithm, Electronic engineering, Natural language processing, CMOS, Chaos Synchronization and Control in Complex Systems, Random Number Generator, Statistical and Nonlinear Physics, Public-key cryptography, one-time pad encryption, Computer science, TK1-9971, Key space, Algorithm, true random number generator, Color Image Encryption, Physics and Astronomy, Computational Theory and Mathematics, Computer Science, Physical Sciences, Cryptography, Chaos, Pseudorandom number generator, Electrical engineering. Electronics. Nuclear engineering, Computer Vision and Pattern Recognition
Linked Full TextAccess URL: https://ieeexplore.ieee.org/ielx7/6287639/8948470/09103046.pdf
https://doaj.org/article/efad148059b9429193bb9c6e7bab31c7
https://dblp.uni-trier.de/db/journals/access/access8.html#NguyenPNK20
https://espace2.etsmtl.ca/id/eprint/20947/
https://ieeexplore.ieee.org/document/9103046/ -
18Academic Journal
Authors: Abdul Razaq, Hanan Alolaiyan, Musheer Ahmad, Awais Yousaf, Umer Shuaib, Waqar Aslam, Moatsum Alawida
Source: IEEE Access, Vol 8, Pp 75473-75490 (2020)
Subject Terms: Permutation (music), Robustness (evolution), Encryption, 02 engineering and technology, Substitution-boxes, Biochemistry, Gene, Cryptanalysis of Block Ciphers and Hash Functions, Theoretical computer science, Artificial Intelligence, Computer security, FOS: Mathematics, 0202 electrical engineering, electronic engineering, information engineering, Cryptosystem, Cryptography and Error-Correcting Codes, Chaos-based Image Encryption Techniques, Symmetric-key algorithm, Physics, Acoustics, coset graphs, Discrete mathematics, Public-key cryptography, Substitution (logic), Computer science, TK1-9971, Programming language, Algorithm, Chemistry, block ciphers, Computer Science, Physical Sciences, Cryptography, Electrical engineering. Electronics. Nuclear engineering, Computer Vision and Pattern Recognition, modular symmetric group, Permutation group, Mathematics, Coset
Linked Full TextAccess URL: https://ieeexplore.ieee.org/ielx7/6287639/8948470/09076049.pdf
https://doaj.org/article/ba4e4a513dd542e4a50f74d8710523d5
https://dblp.uni-trier.de/db/journals/access/access8.html#RazaqAAYSAA20
https://doi.org/10.1109/ACCESS.2020.2989676
https://ieeexplore.ieee.org/document/9076049/ -
19Academic Journal
Authors: Zeeshan Ali, Sajid Hussain, Rana Haseeb Ur Rehman, Asmaa Munshi, Misbah Liaqat, Neeraj Kumar, Shehzad Ashraf Chaudhry
Source: IEEE Access, Vol 8, Pp 107993-108003 (2020)
Subject Terms: FOS: Computer and information sciences, Smart Cards, Computer Networks and Communications, User Authentication Methods and Security Measures, Encryption, Remote User Authentication, 02 engineering and technology, Password, Server, Computer security, Authentication and key-agreement (AKA), 0202 electrical engineering, electronic engineering, information engineering, multi-server authentication, Smart card, fuzzy commitment scheme, Security Protocols for Authentication and Key Exchange, e-healthcare, Authentication, Computer network, Security analysis, Symmetric-key algorithm, Graphical Passwords, Scalability, Biometric Recognition and Security Systems, Public-key cryptography, Computer science, TK1-9971, AVISPA tool, telecare medicine information system (TMIS), Operating system, Authentication (law), Computer Science, Physical Sciences, Signal Processing, Electrical engineering. Electronics. Nuclear engineering, Passwords, Session key, Information Systems
File Description: application/pdf
Linked Full TextAccess URL: https://ieeexplore.ieee.org/ielx7/6287639/8948470/09113685.pdf
https://doaj.org/article/45d8895f36734e8fa894cf163fbd9b53
https://hdl.handle.net/11363/5366 -
20Academic Journal
A Decryptable Attribute-Based Keyword Search Scheme on eHealth Cloud in Internet of Things Platforms
Authors: Lifeng Guo, Zhihao Li, Wei-Chuen Yau, Syh-Yuan Tan
Source: IEEE Access, Vol 8, Pp 26107-26118 (2020)
Subject Terms: Computer Networks and Communications, Internet of Things, Ciphertext, Encryption, Cryptographic primitive, 02 engineering and technology, Cryptographic protocol, Mathematical analysis, Searchable Encryption, Server, Artificial Intelligence, Computer security, FOS: Mathematics, 0202 electrical engineering, electronic engineering, information engineering, Cloud computing, Attribute-Based Encryption, Scheme (mathematics), Security Protocols for Authentication and Key Exchange, Computer network, Identity-Based Encryption, Elliptic Curve Cryptography, Advanced Cryptographic Schemes and Protocols, Symmetric-key algorithm, Public-key cryptography, Computer science, TK1-9971, 3. Good health, World Wide Web, Attribute-based encryption, Operating system, Attribute-based, Computer Science, Physical Sciences, Cryptography, eHealth, Electrical engineering. Electronics. Nuclear engineering, Security in Wireless Sensor Networks, searchable encryption, Homomorphic Encryption, decryptable, The Internet, Mathematics
Linked Full TextAccess URL: https://ieeexplore.ieee.org/ielx7/6287639/8948470/08978860.pdf
https://doaj.org/article/e816d666788849699fc26e22eb62d0e5