Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,766,405 papers from all fields of science
Search
Sign In
Create Free Account
Encryption
Known as:
Encryption algorithms
, List of ciphers
, Encryption and decryption
Expand
In cryptography, encryption is the process of encoding messages or information in such a way that only authorized parties can read it. Encryption…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Actor model
Anonym.OS
Backup
Certificate policy
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2016
Review
2016
A Conceptual Security Framework for Cloud Computing Issues
Shadi A. Aljawarneh
,
M. B. Yassein
International Journal of Intelligent Information…
2016
Corpus ID: 357545
In this article, perspectives from Cloud computing practitioners are shown in order to address clients concerns and bring about…
Expand
2013
2013
A New Approach to Partial Image Encryption
B. Parameshachari
,
K. M. S. Soyjaudah
2013
Corpus ID: 59906706
The traffic of digital images and video has grown rapidly in the internet. Security becomes important for several applications…
Expand
Highly Cited
2009
Highly Cited
2009
ACTION: Breaking the Privacy Barrier for RFID Systems
Li Lu
,
Yunhao Liu
,
Jinsong Han
IEEE INFOCOM
2009
Corpus ID: 9472949
In order to protect privacy, radio frequency identification (RFID) systems employ privacy-preserving authentication (PPA) to…
Expand
Highly Cited
2005
Highly Cited
2005
Data Encryption Standard (DES)
A. Biryukov
,
C. Cannière
Encyclopedia of Cryptography and Security
2005
Corpus ID: 6547274
Background TheData Encryption Standard (DES) [] has been around for more than years. During this time, the standard was…
Expand
Highly Cited
2005
Highly Cited
2005
On Blind Compression of Encrypted Correlated Data Approaching The Source Entropy Rate
D. Schonberg
,
S. Draper
,
K. Ramchandran
2005
Corpus ID: 18936472
Traditional data transmission over an insecure noiseless channel consists of first compressing data for efficiency and then…
Expand
Highly Cited
2005
Highly Cited
2005
Lightweight Key Management for IEEE 802.11 Wireless LANs with Key Refresh and Host Revocation
A. Wool
Wirel. Networks
2005
Corpus ID: 12215642
The IEEE 802.11 Wireless LAN standard has been designed with very limited key management capabilities, using up to 4 static, long…
Expand
Highly Cited
2005
Highly Cited
2005
H.264/AVC video authentication using skipped macroblocks for an erasable watermark
Dima Pröfrock
,
H. Richter
,
M. Schlauweg
,
E. Müller
Visual Communications and Image Processing
2005
Corpus ID: 15826220
This paper presents a new watermarking framework, suitable for authentication of H.264 compressed videos. The authentication data…
Expand
2005
2005
Matching TCP packets and its application to the detection of long connection chains on the Internet
Jianhua Yang
,
S. S. Huang
19th International Conference on Advanced…
2005
Corpus ID: 11946579
Network attackers usually launch their attacks behind a long connection chain. One way to stop such attacks is to prevent the…
Expand
Highly Cited
2004
Highly Cited
2004
A steganographic scheme for secure communications based on the chaos and euler Theorem
D. Lou
,
Chia-Hung Sung
IEEE transactions on multimedia
2004
Corpus ID: 12770859
Steganography has been proposed as a methodology for transmitting messages through innocuous covers to conceal their existence…
Expand
Highly Cited
1965
Highly Cited
1965
B.S.T.J. briefs: Holographic image projection through inhomogeneous media
H. Kogelnik
1965
Corpus ID: 64012225
This brief reports on an experimental test of a hologram technique that is capable of projecting ulldistorted images through…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE