Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,638,413 papers from all fields of science
Search
Sign In
Create Free Account
Data Encryption
Known as:
Data Encryptions
, Encryption, Data
, Encryptions, Data
National Institutes of Health
Create Alert
Alert
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Privacy-Preserving Ridge Regression over Distributed Data from LHE ∗
Irene Giacomelli
,
S. Jha
,
M. Joye
,
C. Page
,
Kyonghwan Yoon
2017
Corpus ID: 36096429
Linear regression with 2-norm regularization (i.e., ridge regression) is an important statistical technique that models the…
Expand
2015
2015
Designing an Efficient Image Encryption-then Compression System
B. Suneetha
2015
Corpus ID: 16555279
In many practical scenarios, image encryption has to be conducted prior to image compression. This has led to the problem of how…
Expand
2015
2015
Assuring Integrity in Privacy Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
CH. Keerthi
,
Dr. C. Shoba
2015
Corpus ID: 212530384
– Cloud computing is a general term for anything that involves delivering hosted services over the Internet and centralize their…
Expand
2014
2014
A Robust Convertible Multi-Authenticated Encryption Scheme with One-Way Hash Function
Chung-Fu Lu
,
Chien-Lung Hsu
,
Han-Yu Lin
,
C. Su
2014
Corpus ID: 17659513
A convertible multi-authenticated encryption (CMAE) scheme allows a group of signers to cooperatively produce a valid…
Expand
2011
2011
Recoverable Encryption through Noised Secret Res. Rep. 2012-2-18)
S. Jajodia
2011
Corpus ID: 18389618
Encryption key safety is the Achilles’ heel of modern cryptography. Simple backup copies offset the risk of key loss, but…
Expand
2011
2011
TGIS : Booting Trust for Secure Information Sharing in Mobile Group Collaborations
Katharine Chang
,
Xinwen Zhang
,
Guoqiang Wang
,
K. Shin
2011
Corpus ID: 18659744
Mobile computing has drawn considerable attention because of the various types of mobile devices and services that are becoming…
Expand
2008
2008
Bilinear Pairings Based Convertible Authenticated Encryption Scheme with Provable Recipient
Han-Yu Lin
,
Tzong-Sun Wu
2008
Corpus ID: 19612842
Convertible authenticated encryption (CAE) schemes are important cryptographic techniques which are applicable to many…
Expand
2008
2008
An Embedding of Cryptol in HOL-4
Guodong Li
,
Konrad Slind
2008
Corpus ID: 14463616
In this paper we explore a shallow embedding of Cryptol in HOL-4 by providing a way to import Cryptol programs into HOL-4 so as…
Expand
2007
2007
ECC Based Convertible Authenticated Encryption Scheme Using Self-Certified Public Key Systems
Tzong-Sun Wu
,
Han-Yu Lin
2007
Corpus ID: 7392877
This paper presents an ECC (Elliptic Curve Cryptography) based convertible authenticated encryption (CAE) scheme using self…
Expand
2007
2007
Generalized convertible authenticated encryption schemes for smart card applications
Tzong-Sun Wu
,
Chien-Lung Hsu
,
Han-Yu Lin
2007
Corpus ID: 55980629
Authenticated encryption schemes allow the signer to produce an encrypted message such that only the designated recipient can…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE