Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,499,023 papers from all fields of science
Search
Sign In
Create Free Account
Encryption
Known as:
Encryption algorithms
, List of ciphers
, Encryption and decryption
Expand
In cryptography, encryption is the process of encoding messages or information in such a way that only authorized parties can read it. Encryption…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Actor model
Anonym.OS
Backup
Certificate policy
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
A New Approach to Partial Image Encryption
B. Parameshachari
,
K. M. S. Soyjaudah
2013
Corpus ID: 59906706
The traffic of digital images and video has grown rapidly in the internet. Security becomes important for several applications…
Expand
Highly Cited
2013
Highly Cited
2013
Secure Transmission of an Image using Partial Encryption based Algorithm
D. ParameshachariB.
,
K. Soyjaudah
,
A. SumitraDeviK
2013
Corpus ID: 18680993
Encryption is used to securely transmit data in open networks. Each type of data has its own features; therefore different…
Expand
Review
2012
Review
2012
Overview on Partial Image Encryption Approaches
K. Soyjaudah
2012
Corpus ID: 61867692
Image encryption is vital to ensure confidential transmission and storage of images over internet. However a real-time image…
Expand
Highly Cited
2010
Highly Cited
2010
Approximate and exact hybrid algorithms for private nearest-neighbor queries with database protection
Gabriel Ghinita
,
Panos Kalnis
,
Murat Kantarcioglu
,
E. Bertino
GeoInformatica
2010
Corpus ID: 13583389
Mobile devices with global positioning capabilities allow users to retrieve points of interest (POI) in their proximity. To…
Expand
2010
2010
Energy Harvesting via Piezoelectricity
Tanvi Dikshit
,
Dhawal Shrivastava
,
A. Gorey
,
Ashish Gupta
,
Parag Parandkar
,
S. Katiyal
2010
Corpus ID: 110366276
In the present era, wireless data transmission techniques are commonly used in electronic devices. For powering them connection…
Expand
Highly Cited
2005
Highly Cited
2005
Data Encryption Standard (DES)
A. Biryukov
,
C. Cannière
Encyclopedia of Cryptography and Security
2005
Corpus ID: 6547274
Background TheData Encryption Standard (DES) [] has been around for more than years. During this time, the standard was…
Expand
2005
2005
Hoc Networks
2005
Corpus ID: 10331725
2003
2003
Trust modeling for peer-to-peer based computing systems
Farag Azzedin
,
Muthucumaru Maheswaran
Proceedings International Parallel and…
2003
Corpus ID: 29557781
The peer-to-peer approach to design large-scale systems has significant benefits including scalability, low cost of ownership…
Expand
2000
2000
Protocol-independent secrecy
J. Millen
,
H. Ruess
Proceeding IEEE Symposium on Security and…
2000
Corpus ID: 2048891
Inductive proofs of secrecy invariants for cryptographic protocols can be facilitated by separating the protocol dependent part…
Expand
1999
1999
Software smart cards via cryptographic camouflage
D. N. Hoover
,
B. N. Kausik
Proceedings of the IEEE Symposium on Security…
1999
Corpus ID: 7473159
A sensitive point in public key cryptography is how to protect the private key. We outline a method of protecting private keys…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE