Search
for Topics
All Reviews
Browse All Reviews
>
Data (E)
> Data Encryption (E.3)
Options:
All Media Types
Journals
Proceedings
Div Books
Whole Books
Other
Date Reviewed
Title
Author
Publisher
Published Date
Descending
Ascending
1-10 of 272 Reviews about "
Data Encryption (E.3)
":
Date Reviewed
Protecting privacy through homomorphic encryption
Lauter K., Dai W., Laine K., Springer, New York, NY, 2022. 176 pp. Type: Book (9783030772871)
With the growing use of sensitive personal information, which also corresponds to the term “personally identifiable information (PII)” in information and communications technology (ICT) environments, the requirements for privacy protec...
Jun 2 2023
Integrity-verifiable conjunctive keyword searchable encryption in cloud storage
Li Y., Zhou F., Qin Y., Lin M., Xu Z. International Journal of Information Security 17(5): 549-568, 2018. Type: Article
Nowadays, data is becoming more and more confidential and sensitive, hence the growing need for encryption. But once data is encrypted, so are the keywords needed to search for it. So people are faced with the challenging task of searc...
Dec 14 2018
Quantum computing: an environment for intelligent large scale real application
Hassanien A., Elhoseny M., Kacprzyk J., Springer International Publishing, New York, NY, 2018. 505 pp. Type: Book (978-3-319636-38-2)
The book covers applications in quantum computing, along with some fundamental research. The application areas include cryptography, networking, image processing, optimization, and multi-user systems. The research work includes quantum...
Nov 26 2018
Codes, cryptology and curves with computer algebra
Pellikaan R., Wu X., Bulygin S., Jurrius R., Cambridge University Press, New York, NY, 2018. 606 pp. Type: Book (978-0-521520-36-2)
This volume offers a terse, highly formal exposition of the relation between the four subjects named in the title: codes (transformations of a stream of information), cryptology (transformations that seek to hide the original content),...
Sep 13 2018
Tutorials on the foundations of cryptography: dedicated to Oded Goldreich
Lindell Y., Springer International Publishing, New York, NY, 2017. 450 pp. Type: Book (978-3-319570-47-1)
The foundations of cryptography
[1], assembled from the lecture notes of Oded Goldreich, is widely known for its high value in cryptographic research. Just like its name, the book discusses many pivotal problems of cryptology in...
Jun 1 2018
Cracking codes with Python: an introduction to building and breaking ciphers
Sweigart A., No Starch Press, San Francisco, CA, 2018. 416 pp. Type: Book (978-1-593278-22-9)
One of the many things I like about the Python programming language is that, once you learn basic Python programming, a whole host of other interesting ideas are within your grasp. I am one of those people who likes to learn things by ...
Jun 1 2018
Mathematical modelling for next-generation cryptography: CREST Crypto-Math Project
Takagi T., Wakayama M., Tanaka K., Kunihiro N., Kimoto K., Duong D., Springer International Publishing, New York, NY, 2017. 368 pp. Type: Book
Cryptography is the science of analyzing and deciphering codes and ciphers. Today, cryptography is widely used in many day-to-day applications. This book was produced as part of the CREST Crypto-Math Project funded by the Japan Science...
May 1 2018
Proxy-assisted access control scheme of cloud data for smart cities
Fan K., Wang J., Wang X., Yang Y. Personal and Ubiquitous Computing 21(5): 937-947, 2017. Type: Article
The rapid development of cloud and fog computing accompanied by the deployment of the Internet of Things (IoT) ensure big data collection from various sources, including humans, devices, and assets. The core of any smart city project i...
Apr 5 2018
A generalized attack on RSA type cryptosystems
Bunder M., Nitaj A., Susilo W., Tonien J. Theoretical Computer Science 704 74-81, 2017. Type: Article
The safety of the well-known RSA cryptosystem is based on the fact that, in general, it is computationally very hard to factorize large integers. Given two large prime numbers
p
and
q
, the public k...
Mar 23 2018
Reproducible circularly secure bit encryption: applications and realizations
Hajiabadi M., Kapron B. Journal of Cryptology 30(4): 1187-1237, 2017. Type: Article
Homomorphic encryption permits processing information without actually decrypting it and is found useful in cloud-based applications. Circularly secure bit encryptions ensure the homomorphic property. This paper provides cryptographic ...
Mar 22 2018
Display
5
10
15
25
50
100
per page
Reproduction in whole or in part without permission is prohibited. Copyright 1999-2024 ThinkLoud
®
Terms of Use
|
Privacy Policy