Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,789,265 papers from all fields of science
Search
Sign In
Create Free Account
Data Encryption
Known as:
Data Encryptions
, Encryption, Data
, Encryptions, Data
National Institutes of Health
Create Alert
Alert
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Designing an Efficient Image Encryption-then Compression System
B. Suneetha
2015
Corpus ID: 16555279
In many practical scenarios, image encryption has to be conducted prior to image compression. This has led to the problem of how…
Expand
2015
2015
ECG based biometric human identification using chaotic encryption
Md Jahiruzzaman
,
A. B. M. Aowlad Hossain
International Conference on Electrical…
2015
Corpus ID: 6596825
Biometric identification provides a reliable performance on recognition of identity for different security and authentication…
Expand
2014
2014
XDS-I Outsourcing Proxy: Ensuring Confidentiality While Preserving Interoperability
Luís S. Ribeiro
,
Carlos Viana-Ferreira
,
J. Oliveira
,
C. Costa
IEEE journal of biomedical and health informatics
2014
Corpus ID: 13928435
The interoperability of services and the sharing of health data have been a continuous goal for health professionals, patients…
Expand
2013
2013
Feasibility of Deploying Biometric Encryption in Mobile Cloud Computing
Kao Zhao
,
Hai Jin
,
Deqing Zou
,
Gang Chen
,
Weiqi Dai
ChinaGrid
2013
Corpus ID: 2748092
Biometric Encryption (BE) is a new issue in the information security field which is based on biometric identification and…
Expand
2013
2013
Encryption Schemes with Post-Challenge Auxiliary Inputs
Tsz Hon Yuen
,
Ye Zhang
,
S. Yiu
IACR Cryptology ePrint Archive
2013
Corpus ID: 5142560
In this paper, we tackle the open problem of proposing a leakage-resilience encryption model that can capture leakage from both…
Expand
Highly Cited
2010
Highly Cited
2010
Authorized Private Keyword Search over Encrypted Personal Health Records in Cloud Computing
Ming Li
,
Shucheng Yu
,
N. Cao
,
Wenjing Lou
2010
Corpus ID: 15303192
Recently, personal health record (PHR) has emerged as a patient-centric model of health information exchange, which features…
Expand
2008
2008
Bilinear Pairings Based Convertible Authenticated Encryption Scheme with Provable Recipient
Han-Yu Lin
,
Tzong-Sun Wu
2008
Corpus ID: 19612842
Convertible authenticated encryption (CAE) schemes are important cryptographic techniques which are applicable to many…
Expand
2008
2008
An Embedding of Cryptol in HOL-4
Guodong Li
,
Konrad Slind
2008
Corpus ID: 14463616
In this paper we explore a shallow embedding of Cryptol in HOL-4 by providing a way to import Cryptol programs into HOL-4 so as…
Expand
2007
2007
On Image Encryption: Comparison between AES and a Novel Chaotic Encryption Scheme
Muhammad Asiml
,
Varun Jeotil
International Conference on Signal Processing…
2007
Corpus ID: 18189981
In this paper, a novel chaotic image encryption scheme based on multiple chaotic systems, a 2D cat map and S-box, is proposed…
Expand
2007
2007
ECC Based Convertible Authenticated Encryption Scheme Using Self-Certified Public Key Systems
Tzong-Sun Wu
,
Han-Yu Lin
2007
Corpus ID: 7392877
This paper presents an ECC (Elliptic Curve Cryptography) based convertible authenticated encryption (CAE) scheme using self…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE