咨询与建议

限定检索结果

文献类型

  • 6 篇 期刊文献

馆藏范围

  • 6 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6 篇 工学
    • 3 篇 计算机科学与技术...
    • 3 篇 网络空间安全
    • 2 篇 电子科学与技术(可...
    • 1 篇 信息与通信工程

主题

  • 6 篇 ciphertext
  • 5 篇 encryption
  • 3 篇 decryption
  • 2 篇 homomorphic
  • 2 篇 cryptography
  • 1 篇 internet of thin...
  • 1 篇 data security
  • 1 篇 simulation
  • 1 篇 sha-512
  • 1 篇 cp-abe
  • 1 篇 key
  • 1 篇 access policy
  • 1 篇 divisor(gcd)
  • 1 篇 hash code
  • 1 篇 fully
  • 1 篇 problem
  • 1 篇 text
  • 1 篇 attribute
  • 1 篇 aes
  • 1 篇 symmetric

机构

  • 1 篇 department of co...
  • 1 篇 department of in...
  • 1 篇 department of ma...
  • 1 篇 department of el...
  • 1 篇 school of mathem...
  • 1 篇 school of engine...
  • 1 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 department of na...
  • 1 篇 department of co...
  • 1 篇 school of mathem...
  • 1 篇 college of compu...
  • 1 篇 department of co...
  • 1 篇 department of me...
  • 1 篇 science and tech...
  • 1 篇 school of comput...

作者

  • 1 篇 krovi raja sekha...
  • 1 篇 imran khan
  • 1 篇 mingyu fan
  • 1 篇 bassem f.felemba...
  • 1 篇 jing yang
  • 1 篇 ashit kumar dutt...
  • 1 篇 saman riaz
  • 1 篇 muhammad nadeem
  • 1 篇 baha eldin hamou...
  • 1 篇 syeda wajiha zah...
  • 1 篇 li xinyan
  • 1 篇 lu dianjun
  • 1 篇 mou huajian
  • 1 篇 sultan almotairi
  • 1 篇 ayman a.aly
  • 1 篇 zhiyin kong
  • 1 篇 moteeb al moteri
  • 1 篇 abdallah abdalla...
  • 1 篇 p.prathap nayudu
  • 1 篇 ali arshad

语言

  • 6 篇 英文
检索条件"主题词=ciphertext"
6 条 记 录,以下是1-10 订阅
排序:
Secured Access Policy in ciphertext-Policy Attribute-Based Encryption for Cloud Environment
收藏 引用
Computer Systems Science & Engineering 2023年 第7期46卷 1079-1092页
作者: P.Prathap Nayudu Krovi Raja Sekhar Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation VaddeswaramAPIndia
The cloud allows clients to store and share *** on the user’s needs,it is imperative to design an effective access control plan to share the information only with approved *** user loses control of their data when th... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
An Improved ciphertext Retrieval Scheme Based on Fully Homomorphic Encryption
收藏 引用
Wuhan University Journal of Natural Sciences 2019年 第3期24卷 218-222页
作者: LI Xinyan MOU Huajian LU Dianjun School of Mathematics and Statistics Yangtze Normal University College of Computer Engineering Yangtze Normal University School of Mathematics and Statistics Qinghai Normal University
In order to guarantee the user's privacy and the integrity of data when retrieving ciphertext in an untrusted cloud environment, an improved ciphertext retrieval scheme was proposed based on full homomorphic encryptio... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
An Efficient Technique to Prevent Data Misuse with Matrix Cipher Encryption Algorithms
收藏 引用
Computers, Materials & Continua 2023年 第2期74卷 4059-4079页
作者: Muhammad Nadeem Ali Arshad Saman Riaz Syeda Wajiha Zahra Ashit Kumar Dutta Moteeb Al Moteri Sultan Almotairi Department of Computing Abasyn UniversityIslamabadPakistan Department of Computer Science National University of TechnologyIslamabadPakistan Department of Computer Science and Information Systems College of Applied SciencesAlMaarefa UniversityRiyadh13713Kingdom of Saudi Arabia Department of Management Information Systems Business Administration CollegeKing Saud UniversityRiyadh11451Saudi Arabia Department of Natural and Applied Sciences Faculty of Community CollegeMajmaah UniversityMajmaah11952Saudi Arabia
Many symmetric and asymmetric encryption algorithms have been developed in cloud computing to transmit data in a secure *** cryptography is a data encryption mechanism that consists of different steps and prevents the... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Multi-dimensional Security Range Query for Industrial IoT
收藏 引用
Computers, Materials & Continua 2022年 第7期72卷 157-179页
作者: Abdallah Abdallah Ayman A.Aly Bassem F.Felemban Imran Khan Ki-Il Kim School of Engineering Technology Al Hussein Technical University(HTU)Amman11831Jordan Department of Mechanical Engineering College of EngineeringTaif UniversityTaif21944Saudi Arabia Department of Electrical Engineering University of Engineering and Technology PeshawarPakistan Department of Computer Science and Engineering Chungnam National UniversityDaejeon34134Korea
The Internet of Things(IoT)has allowed for significant advancements in applications not only in the home,business,and environment,but also in factory *** Internet of Things(IIoT)brings all of the benefits of the IoT t... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Comparative Study of Different Cryptographic Algorithms
收藏 引用
Journal of Information Security 2020年 第3期11卷 138-148页
作者: Baha Eldin Hamouda Hassan Hamouda Department of Information Technology Gulf Colleges Hafar Al-Batin KSA
With the increasing interconnection of computer networks and sophistication of cyber-attacks, Cryptography is one way to make sure that confidentiality, authentication, integrity, availability, and identification of d... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Simulation Study Based on Somewhat Homomorphic Encryption
收藏 引用
Journal of Computer and Communications 2014年 第2期2卷 109-111页
作者: Jing Yang Mingyu Fan Guangwei Wang Zhiyin Kong School of Computer Science and Engineering University Electronic Science and Technology of China Chengdu China Science and Technology on Information Assurance Laboratory Beijing China.
At present study, homomorphic encryption scheme is most focusing on algorithm efficiency and security and the rare for homomorphic encryption simulation research. This paper for the Gentry’s Somewhat Homomorphic Encr... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论