Skip to search formSkip to main contentSkip to account menu

Data Encryption

Known as: Data Encryptions, Encryption, Data, Encryptions, Data 
National Institutes of Health

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Linear regression with 2-norm regularization (i.e., ridge regression) is an important statistical technique that models the… 
2015
2015
In many practical scenarios, image encryption has to be conducted prior to image compression. This has led to the problem of how… 
2015
2015
– Cloud computing is a general term for anything that involves delivering hosted services over the Internet and centralize their… 
2014
2014
A convertible multi-authenticated encryption (CMAE) scheme allows a group of signers to cooperatively produce a valid… 
2011
2011
Encryption key safety is the Achilles’ heel of modern cryptography. Simple backup copies offset the risk of key loss, but… 
2011
2011
Mobile computing has drawn considerable attention because of the various types of mobile devices and services that are becoming… 
2008
2008
Convertible authenticated encryption (CAE) schemes are important cryptographic techniques which are applicable to many… 
2008
2008
In this paper we explore a shallow embedding of Cryptol in HOL-4 by providing a way to import Cryptol programs into HOL-4 so as… 
2007
2007
This paper presents an ECC (Elliptic Curve Cryptography) based convertible authenticated encryption (CAE) scheme using self… 
2007
2007
Authenticated encryption schemes allow the signer to produce an encrypted message such that only the designated recipient can…