Skip to search formSkip to main contentSkip to account menu

Data Encryption

Known as: Data Encryptions, Encryption, Data, Encryptions, Data 
National Institutes of Health

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
In many practical scenarios, image encryption has to be conducted prior to image compression. This has led to the problem of how… 
2015
2015
Biometric identification provides a reliable performance on recognition of identity for different security and authentication… 
2014
2014
The interoperability of services and the sharing of health data have been a continuous goal for health professionals, patients… 
2013
2013
Biometric Encryption (BE) is a new issue in the information security field which is based on biometric identification and… 
2013
2013
In this paper, we tackle the open problem of proposing a leakage-resilience encryption model that can capture leakage from both… 
Highly Cited
2010
Highly Cited
2010
Recently, personal health record (PHR) has emerged as a patient-centric model of health information exchange, which features… 
2008
2008
Convertible authenticated encryption (CAE) schemes are important cryptographic techniques which are applicable to many… 
2008
2008
In this paper we explore a shallow embedding of Cryptol in HOL-4 by providing a way to import Cryptol programs into HOL-4 so as… 
2007
2007
In this paper, a novel chaotic image encryption scheme based on multiple chaotic systems, a 2D cat map and S-box, is proposed… 
2007
2007
This paper presents an ECC (Elliptic Curve Cryptography) based convertible authenticated encryption (CAE) scheme using self…