Skip to search formSkip to main contentSkip to account menu

Encryption

Known as: Encryption algorithms, List of ciphers, Encryption and decryption 
In cryptography, encryption is the process of encoding messages or information in such a way that only authorized parties can read it. Encryption… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2016
Review
2016
In this article, perspectives from Cloud computing practitioners are shown in order to address clients concerns and bring about… 
2013
2013
The traffic of digital images and video has grown rapidly in the internet. Security becomes important for several applications… 
Highly Cited
2009
Highly Cited
2009
In order to protect privacy, radio frequency identification (RFID) systems employ privacy-preserving authentication (PPA) to… 
Highly Cited
2005
Highly Cited
2005
Background TheData Encryption Standard (DES) [] has been around for more than  years. During this time, the standard was… 
Highly Cited
2005
Highly Cited
2005
Traditional data transmission over an insecure noiseless channel consists of first compressing data for efficiency and then… 
Highly Cited
2005
Highly Cited
2005
  • A. Wool
  • 2005
  • Corpus ID: 12215642
The IEEE 802.11 Wireless LAN standard has been designed with very limited key management capabilities, using up to 4 static, long… 
Highly Cited
2005
Highly Cited
2005
This paper presents a new watermarking framework, suitable for authentication of H.264 compressed videos. The authentication data… 
2005
2005
Network attackers usually launch their attacks behind a long connection chain. One way to stop such attacks is to prevent the… 
Highly Cited
2004
Highly Cited
2004
Steganography has been proposed as a methodology for transmitting messages through innocuous covers to conceal their existence… 
Highly Cited
1965
Highly Cited
1965
This brief reports on an experimental test of a hologram technique that is capable of projecting ulldistorted images through…