Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,206,854 papers from all fields of science
Search
Sign In
Create Free Account
Encrypt
Known as:
Encrypt (movie)
Encrypt is a television movie that premiered June 14, 2003 on the Sci-Fi Channel. Set in the year 2068, the Earth's surface is in a cataclysmic…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
2 relations
Holograph
Robot
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Using a Chaotic Cipher to Encrypt Ethernet Traffic
A. Pérez-Resa
,
M. Garcia-Bosque
,
C. Sánchez-Azqueta
,
S. Celma
International Symposium on Circuits and Systems
2018
Corpus ID: 53085878
In this work a new physical layer encryption method for Ethernet 1000Base-X standard is proposed. The proposed encryption scheme…
Expand
2017
2017
An AES–CHAOS-Based Hybrid Approach to Encrypt Multiple Images
Shelza Suri
,
R. Vijay
2017
Corpus ID: 64830897
In today’s world, one thing is for sure that technologies have advanced. Internet is being used as the primary mode of transfer…
Expand
2017
2017
Confidentiality Technique to Encrypt and Obfuscate Non-Numerical and Numerical Data to Enhance Security in Public Cloud Storage
S. A. Oli
,
L. Arockiam
World Congress on Computing and Communication…
2017
Corpus ID: 32599286
Modern technologies witness lot more developments. Cloud Computing (CC) is one of the rapid developments. The demands, the…
Expand
2016
2016
Protecting sensitive data
T. Galvin
,
James Moffat McGill Hinkle
,
+4 authors
Gregory Scott Woods
2016
Corpus ID: 145839518
Various examples described herein are directed to systems and methods for securing data. A security system may receive a first…
Expand
2015
2015
FPGA based implementation of elliptic curve cryptography
M. Nawari
,
Hazim Ahmed
,
A. Hamid
,
Mohamed Elkhidir
World Symposium on Computer Networks and…
2015
Corpus ID: 7747782
Elliptic curve cryptography is a public key cryptography technique based on the algebraic structure of elliptic curves over…
Expand
2015
2015
SIPHER: Scalable Implementation of Primitives for Homomorphic Encryption
David Cousins
,
Kurt Rohloff
,
Christopher Peikert
,
Daniel Sumorok
2015
Corpus ID: 51854013
Abstract : The goal of SIPHER was to improve the efficiency and scalability of Fully Homomorphic Encryption (FHE). Significant…
Expand
2015
2015
An Initial Approach for a NFC M-Ticketing Urban Transport System
C. Ivan
,
Roxana Balag
2015
Corpus ID: 40450989
Public transport plays an important role in the daily lives of hundreds of millions of people. The limited national and local…
Expand
2011
2011
Data Management Recommendations for Research Centres and Programmes
Laurence Horton
,
V. Eynden
,
Louise Corti
,
L. Bishop
2011
Corpus ID: 182043971
The Data Management Planning for ESRC Research Data-Rich Investments project (DMP-ESRC) is funded by the Joint Information…
Expand
2000
2000
Obstacles to freedom and privacy by design
R. Wright
Conference on Computers, Freedom and Privacy
2000
Corpus ID: 2202309
Technology that inherently protects civil liberties is a nice idea in theory. In practice, however, it may be difficult to…
Expand
1999
1999
Users' Security Handbook
E. Guttman
,
Lorna Leong
,
G. Malkin
Request for Comments
1999
Corpus ID: 45760677
The Users' Security Handbook is the companion to the Site Security Handbook (SSH). It is intended to provide users with the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE