Encrypt

Known as: Encrypt (movie) 
Encrypt is a television movie that premiered June 14, 2003 on the Sci-Fi Channel. Set in the year 2068, the Earth's surface is in a cataclysmic… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1999-2018
02419992018

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
The 2013 National Security Agency revelations of pervasive monitoring have led to an "encryption rush" across the computer and… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 3
  • figure 5
Is this relevant?
2016
2016
Let’s Encrypt is a new entrant in the Certificate Authority ecosystem that offers free and automated certificate signing. It is… (More)
  • figure 1
  • table I
  • figure 2
  • table II
  • table III
Is this relevant?
2015
2015
This paper presents the results of a laboratory study involving Mailvelope, a modern PGP client that integrates tightly with… (More)
  • table 1
  • figure 1
Is this relevant?
2015
2015
Psychology and neuroscience literature shows the existance of upper bounds on the human capacity for executing cognitive tasks… (More)
  • figure 1
  • figure 2
Is this relevant?
2014
2014
Online Social Networks (OSNs) are popular communication channels that reach a diverse strate of society. At the same time, their… (More)
Is this relevant?
2011
2011
We are taught from a young age that plagiarism (copying other's work) is wrong. However, the problem of Illegal copies of… (More)
  • table 2
Is this relevant?
2010
2010
Based on re-keying techniques by Abdalla, Bellare, and Borst [1, 2], we consider two black-box secure block cipher based… (More)
  • figure 1
  • figure 3
  • figure 4
  • figure 5
  • table 1
Is this relevant?
2008
2008
  • Jan Sousedek
  • 2008
Interfaces of security software are very often clumsy or confusing. Users are dealing with bad usability standard, that this type… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2001
2001
The objective of this research is to apply the data hiding technique to encrypt micro-array image with the help of contrast… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1999
Highly Cited
1999
User errors cause or contribute to most computer security failures, yet user interfaces for security still tend to be clumsy… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?