Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,869,414 papers from all fields of science
Search
Sign In
Create Free Account
Encryption
Known as:
Encryption algorithms
, List of ciphers
, Encryption and decryption
Expand
In cryptography, encryption is the process of encoding messages or information in such a way that only authorized parties can read it. Encryption…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Actor model
Anonym.OS
Backup
Certificate policy
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2015
Review
2015
An ACO look-ahead approach to QOS enabled fault- tolerant routing in MANETs
S. Surendran
,
S. Prakash
China Communications
2015
Corpus ID: 35444625
MANET routing is critical and routing decision should be made sooner before the node leaves the network. Fast decisions always…
Expand
2013
2013
A New Approach to Partial Image Encryption
B. Parameshachari
,
K. M. S. Soyjaudah
2013
Corpus ID: 59906706
The traffic of digital images and video has grown rapidly in the internet. Security becomes important for several applications…
Expand
Highly Cited
2013
Highly Cited
2013
Secure Transmission of an Image using Partial Encryption based Algorithm
D. ParameshachariB.
,
K. Soyjaudah
,
A. SumitraDeviK
2013
Corpus ID: 18680993
Encryption is used to securely transmit data in open networks. Each type of data has its own features; therefore different…
Expand
Review
2012
Review
2012
Overview on Partial Image Encryption Approaches
K. Soyjaudah
2012
Corpus ID: 61867692
Image encryption is vital to ensure confidential transmission and storage of images over internet. However a real-time image…
Expand
Highly Cited
2010
Highly Cited
2010
Approximate and exact hybrid algorithms for private nearest-neighbor queries with database protection
Gabriel Ghinita
,
Panos Kalnis
,
Murat Kantarcioglu
,
E. Bertino
GeoInformatica
2010
Corpus ID: 13583389
Mobile devices with global positioning capabilities allow users to retrieve points of interest (POI) in their proximity. To…
Expand
Highly Cited
2009
Highly Cited
2009
Intelligent sensing and classification in ad hoc networks: a case study
T. Dempsey
,
G. Sahin
,
Yu Morton
,
C. Hopper
IEEE Aerospace and Electronic Systems Magazine
2009
Corpus ID: 22747429
Wireless ad hoc networks have fundamentally altered today's battlefield, with applications ranging from unmanned air vehicles to…
Expand
Highly Cited
2005
Highly Cited
2005
Data Encryption Standard (DES)
A. Biryukov
,
C. Cannière
Encyclopedia of Cryptography and Security
2005
Corpus ID: 6547274
Background TheData Encryption Standard (DES) [] has been around for more than years. During this time, the standard was…
Expand
Highly Cited
2005
Highly Cited
2005
H.264/AVC video authentication using skipped macroblocks for an erasable watermark
Dima Pröfrock
,
H. Richter
,
M. Schlauweg
,
E. Müller
Visual Communications and Image Processing
2005
Corpus ID: 15826220
This paper presents a new watermarking framework, suitable for authentication of H.264 compressed videos. The authentication data…
Expand
Highly Cited
2004
Highly Cited
2004
A steganographic scheme for secure communications based on the chaos and euler Theorem
D. Lou
,
Chia-Hung Sung
IEEE transactions on multimedia
2004
Corpus ID: 12770859
Steganography has been proposed as a methodology for transmitting messages through innocuous covers to conceal their existence…
Expand
Highly Cited
1989
Highly Cited
1989
Macrocycles containing tin. Solid complexes of anions encrypted in macrobicyclic Lewis acidic hosts
M. Newcomb
,
J. Horner
,
M. T. Blanda
,
P. J. Squattrito
1989
Corpus ID: 93591984
Abstract : Crystalline complexes of 1,10-dichloro-1,10-distannabicyclo.8. 8hexacosane and benzyltriphenylphosphonium chloride…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required