Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 216 matches
- 2024
- Ahmed Fanfakh, Hassan Noura, Raphaël Couturier:
Simultaneous encryption and authentication of messages over GPUs. Multim. Tools Appl. 83(2): 4757-4789 (2024) - Shi Lin, Li Cui, Ke Niu:
End-to-End Encrypted Message Distribution System for the Internet of Things Based on Conditional Proxy Re-Encryption. Sensors 24(2): 438 (2024) - Jing Yang, Mingyu Fan, Guangwei Wang:
Retraction Note: Encryption scheme with mixed homomorphic signature based on message authentication for digital image. J. Supercomput. 80(7): 10192 (2024) - 2023
- Alexander Moch:
Provable security for lightweight message authentication and encryption. University of Mannheim, Germany, 2023 - Kamalesh Acharya, Amit Kumar Singh, Sourav Mukhopadhyay:
Constructions of broadcast encryption with personalized messages from bilinear map. Comput. Commun. 209: 91-101 (2023) - Shuang Yao, Dawei Zhang:
BPRT: A blockchain-based privacy-preserving transaction scheme based on an efficient broadcast encryption with personalized messages. Trans. Emerg. Telecommun. Technol. 34(1) (2023) - Shaoyu Wang, Kaizhi Huang, Keming Ma, Xiaoming Xu, Xiaoyan Hu:
A lightweight encryption and message authentication framework for wireless communication. IET Commun. 17(3): 265-278 (2023) - Shadi Rasheed Masadeh, Hamza Abbass Al-Sewadi, Mohammed Abbas Fadhil Al-Husainy:
A message encryption scheme inspired by Sudoku puzzle. Int. J. Inf. Comput. Secur. 21(3/4): 399-413 (2023) - Sheng Liu, Di Wu, Lanyong Zhang:
CGAN BeiDou Satellite Short-Message-Encryption Scheme Using Ship PVT. Remote. Sens. 15(1): 171 (2023) - Somil Jain, Cristina Hava Muntean, Rohit Verma:
Honey2Fish - A Hybrid Encryption Approach for Improved Password and Message Security. BigDataSecurity/HPSC/IDS 2023: 198-203 - You Lyu, Shengli Liu:
Two-Message Authenticated Key Exchange from Public-Key Encryption. ESORICS (1) 2023: 414-434 - David Valente, Thadeu Brito, Márcio Correia, José Augusto Carvalho, José Lima:
Image Transfer over MQTT in IoT: Message Segmentation and Encryption for Remote Indicator Panels. OL2A (1) 2023: 360-373 - Ahmad Khoureich Ka:
M-Sel: A Message Selection Functional Encryption from Simple Tools. SecITC 2023: 79-96 - You Lyu, Shengli Liu:
Two-Message Authenticated Key Exchange from Public-Key Encryption. IACR Cryptol. ePrint Arch. 2023: 706 (2023) - 2022
- Tamer Shanableh:
HEVC Video Encryption With High Capacity Message Embedding by Altering Picture Reference Indices and Motion Vectors. IEEE Access 10: 22320-22329 (2022) - Mohammed AbuTaha, Islam Amar, Salman AlQahtani:
Parallel and Practical Approach of Efficient Image Chaotic Encryption Based on Message Passing Interface (MPI). Entropy 24(4): 566 (2022) - Hassan N. Noura, Ola Salman, Raphaël Couturier, Ali Chehab:
A Single-Pass and One-Round Message Authentication Encryption for Limited IoT Devices. IEEE Internet Things J. 9(18): 17885-17900 (2022) - Hu Xiong, Lili Wang, Zhida Zhou, Zetong Zhao, Xin Huang, Saru Kumari:
Burn After Reading: Adaptively Secure Puncturable Identity-Based Proxy Re-Encryption Scheme for Securing Group Message. IEEE Internet Things J. 9(13): 11248-11260 (2022) - Xueqiao Liu, Guomin Yang, Willy Susilo, Joseph Tonien, Rongmao Chen, Xixiang Lv:
Message-Locked Searchable Encryption: A New Versatile Tool for Secure Cloud Storage. IEEE Trans. Serv. Comput. 15(3): 1664-1677 (2022) - Akshit Aggarwal, Srinibas Swain:
Blind Two Party ECDSA Signing Based Homomorphic Encryption over Message Passing. AICCSA 2022: 1-5 - Matteo Campanelli, Bernardo David, Hamidreza Khoshakhlagh, Anders Konring, Jesper Buus Nielsen:
Encryption to the Future - A Paradigm for Sending Secret Messages to Future (Anonymous) Committees. ASIACRYPT (3) 2022: 151-180 - Qiuming Liu, Zhexin Yao, Zhen Wu, Zeyao Xu:
Attribute-Based Proxy Re-encryption with Privacy Protection for Message Dissemination in VANET. ICDF2C 2022: 387-402 - Syed Hussain Ali Kazmi, Faizan Qamar, Rosilah Hassan, Kashif Nisar:
Improved QoS in Internet of Things (IoTs) through Short Messages Encryption Scheme for Wireless Sensor Communication. ISPACS 2022: 1-6 - Shaoqiang Wu, Chunfu Jia, Ding Wang:
UP-MLE: Efficient and Practical Updatable Block-Level Message-Locked Encryption Scheme Based on Update Properties. SEC 2022: 251-269 - Shiyuan Xu, Xue Chen, Yunhua He, Yibo Cao, Shang Gao:
VMT: Secure VANETs Message Transmission Scheme with Encryption and Blockchain. WASA (1) 2022: 244-257 - 2021
- Péter Marjai, Péter Lehotay-Kéry, Attila Kiss:
The Use of Template Miners and Encryption in Log Message Compression. Comput. 10(7): 83 (2021) - Yongjun Zhao, Sherman S. M. Chow:
Updatable Block-Level Message-Locked Encryption. IEEE Trans. Dependable Secur. Comput. 18(4): 1620-1631 (2021) - Mohammed Elhabib Kahla, Mounir Beggas, Abdelkader Laouid, Mostefa Kara, Muath AlShaikh:
Asymmetric Image Encryption Based on Twin Message Fusion. AI-CSP 2021: 1-5 - Jing Pan, Xiaofeng Chen, Fangguo Zhang, Willy Susilo:
Lattice-Based Group Encryption with Full Dynamicity and Message Filtering Policy. ASIACRYPT (4) 2021: 156-186 - Suzhen Wu, Zhanhong Tu, Zuocheng Wang, Zhirong Shen, Bo Mao:
When Delta Sync Meets Message-Locked Encryption: a Feature-based Delta Sync Scheme for Encrypted Cloud Storage. ICDCS 2021: 337-347
skipping 186 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-26 10:24 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint