Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 224,872,373 papers from all fields of science
Search
Sign In
Create Free Account
Encryption
Known as:
Encryption algorithms
, List of ciphers
, Encryption and decryption
Expand
In cryptography, encryption is the process of encoding messages or information in such a way that only authorized parties can read it. Encryption…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Actor model
Anonym.OS
Backup
Certificate policy
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
A New Approach to Partial Image Encryption
B. Parameshachari
,
K. M. S. Soyjaudah
2013
Corpus ID: 59906706
The traffic of digital images and video has grown rapidly in the internet. Security becomes important for several applications…
Expand
Highly Cited
2010
Highly Cited
2010
Efficient modified RC5 based on chaos adapted to image encryption
M. Amin
,
A. El-latif
J. Electronic Imaging
2010
Corpus ID: 27982610
RC5 is a well-known block cipher notable for its simplicity, speed, suitability for hardware and software implementation, and its…
Expand
Highly Cited
2010
Highly Cited
2010
A privacy-preserving approach to policy-based content dissemination
Ning Shang
,
Mohamed Nabeel
,
F. Paci
,
E. Bertino
IEEE International Conference on Data Engineering
2010
Corpus ID: 4833265
We propose a novel scheme for selective distribution of content, encoded as documents, that preserves the privacy of the users to…
Expand
Highly Cited
2006
Highly Cited
2006
A Wrist-Worn Integrated Health Monitoring Instrument with a Tele-Reporting Device for Telemedicine and Telecare
Jaesik Kang
,
Taiwoo Yoo
,
Hee Chan Kim
IEEE Transactions on Instrumentation and…
2006
Corpus ID: 6067355
In this paper, the prototype development of a wrist-worn integrated health monitoring device (WIHMD) with tele-reporting function…
Expand
Highly Cited
2005
Highly Cited
2005
Data Encryption Standard (DES)
A. Biryukov
,
C. Cannière
Encyclopedia of Cryptography and Security
2005
Corpus ID: 6547274
Background TheData Encryption Standard (DES) [] has been around for more than years. During this time, the standard was…
Expand
Highly Cited
2005
Highly Cited
2005
On Blind Compression of Encrypted Correlated Data Approaching The Source Entropy Rate
D. Schonberg
,
S. Draper
,
K. Ramchandran
2005
Corpus ID: 18936472
Traditional data transmission over an insecure noiseless channel consists of first compressing data for efficiency and then…
Expand
Highly Cited
2004
Highly Cited
2004
Personalised cryptographic key generation based on FaceHashing
A. Teoh
,
D. Ngo
,
A. Goh
Computers & security
2004
Corpus ID: 8286447
Highly Cited
2000
Highly Cited
2000
MiddleMan: A Video Caching Proxy Server
Soam Acharya
,
B. Smith
2000
Corpus ID: 10616961
This paper describes MiddleMan, a collection of cooperating proxy servers connected by a local area network (LAN). MiddleMan…
Expand
Highly Cited
1999
Highly Cited
1999
Some Notes on Steganography
Notes on
1999
Corpus ID: 55288134
. This essay presents some observations concerning low rate steganography in images where the amount of covert information is…
Expand
Highly Cited
1965
Highly Cited
1965
B.S.T.J. briefs: Holographic image projection through inhomogeneous media
H. Kogelnik
1965
Corpus ID: 64012225
This brief reports on an experimental test of a hologram technique that is capable of projecting ulldistorted images through…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE