ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Education
Religion
Sports
Social Sciences
Economy
Law
Public health
Research
Technology
Administration - Business
all records (73)

Languages
English
Spanish
Portuguese
German
French

Countries
Indonesia
Brazil
South Africa
USA
Poland
Spain
Canada
Italy
Ukraine
Colombia
all records (70)

Years
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
all records (24)

Filter  
 
186.644  Articles
1 of 18.665 pages  |  10  records  |  more records»
Searchable encryption allows a remote server to search over encrypted documents without knowing the sensitive data contents. Prior searchable symmetric encryption schemes focus on single keyword search. Conjunctive Keyword Searches (CKS) schemes improve s... see more

This paper aims to provide security of data in the Cloud using Multiplicative Homomorphic Approach. Encryption process is done with RSA algorithm. In this RSA algorithm, Shor’s algorithm is used for generating Public key Component, which enhances the secu... see more

In the rise of the new Information and Communication Technologies (ICT), governments worldwide as well companies go through a transition, trying to adapt themselves to the Knowledge Society demands. Such innovative technologies enable the improvement of r... see more

Context. Unauthorized access to well-protected information and telecommunication systems is a topical problem in the information security field [1]. For this problem solving, it is proposed to use the deniable encryption mechanisms, which allows itsm... see more

Data protection is representing a huge trade in the modern era; the vast communication development gave this field increased attention from all sorts of parties (friends and foes); integral transforms have played a decent role in many methods that are pro... see more

Encryption in general is the process of keeping up the secrecy of data (both fixed and versatile) utilizing programs that can Convert and make an interpretation of that data into codes so that whenever got to by unapproved people doesn't They can comprehe... see more

With the continuous development of the computers networks, new problems have been posed in the process of keys management in the cryptographic systems. The main element in the cryptographic technologies is the keys management, as the cryptographic algorit... see more

Keeping patient health data private has been a big issue for decades, and this issue will not go away anytime soon. As an integral part of many developing technologies, cryptographic Internet communications ICs (e.g. fog computing and cloud computing) are... see more

1 of 18.665 pages  |  10  records  |  more records»