X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Journal Article (314) 314
Conference Proceeding (153) 153
Book Chapter (22) 22
Publication (15) 15
Book / eBook (10) 10
Newspaper Article (9) 9
Dissertation (4) 4
Magazine Article (4) 4
Technical Report (1) 1
Trade Publication Article (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
encryption (110) 110
mathematics (94) 94
data encryption (89) 89
partial encryption (84) 84
mathematics, applied (74) 74
computer science, theory & methods (73) 73
cryptography (64) 64
partial differential equations (58) 58
data structures, cryptology and information theory (57) 57
discrete mathematics in computer science (56) 56
coding and information theory (55) 55
computer science (55) 55
analysis (54) 54
combinatorics (52) 52
information and communication, circuits (51) 51
engineering, electrical & electronic (50) 50
security (48) 48
computer science, information systems (45) 45
algorithms (39) 39
field programmable gate arrays (37) 37
fpga (36) 36
verschlüsselung (26) 26
cloud computing (25) 25
ordinary differential equations (25) 25
computer science, hardware & architecture (24) 24
partial reconfiguration (23) 23
computer science, software engineering (22) 22
mathematics, general (22) 22
telecommunications (22) 22
chaos (21) 21
computer communication networks (21) 21
difference and functional equations (21) 21
functional analysis (21) 21
methods (20) 20
privacy (20) 20
chaos theory (17) 17
mathematical analysis (17) 17
usage (17) 17
authentication (16) 16
dynamic partial reconfiguration (16) 16
image coding (16) 16
05b10 (15) 15
design (15) 15
hardware (15) 15
algorithm (14) 14
ciphers (14) 14
algorithm analysis and problem complexity (13) 13
data security (13) 13
dynamical systems (13) 13
mathematical models (13) 13
reconfiguration (13) 13
block cipher (12) 12
dynamics (12) 12
management of computing and information systems (12) 12
partial image encryption (12) 12
research (12) 12
synchronization (12) 12
05b25 (11) 11
51e20 (11) 11
artificial intelligence (11) 11
computation (11) 11
computer information security (11) 11
engineering (11) 11
image compression (11) 11
image encryption (11) 11
public key (11) 11
selective encryption (11) 11
studies (11) 11
synchronism (11) 11
systems (11) 11
05e30 (10) 10
applied mathematics (10) 10
computer simulation (10) 10
differential equations (10) 10
efficient (10) 10
entschlüsselung (10) 10
images (10) 10
optimization (10) 10
wireless sensor networks (10) 10
情報 (10) 10
computational complexity (9) 9
cryptanalysis (9) 9
electrical engineering (9) 9
information security (9) 9
maps (9) 9
multimedia (9) 9
networks (9) 9
partial homomorphic encryption (9) 9
protocols (9) 9
software (9) 9
access control (8) 8
circuits (8) 8
embedded systems (8) 8
homomorphic encryption (8) 8
implementation (8) 8
multimedia information systems (8) 8
numerical analysis (8) 8
operating systems (8) 8
stability (8) 8
systems and data security (8) 8
more...
Library Location Library Location
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


IEEE Transactions on Circuits and Systems for Video Technology, ISSN 1051-8215, 06/2007, Volume 17, Issue 6, pp. 774 - 778
Journal Article
IEEE Transactions on Signal Processing, ISSN 1053-587X, 08/2000, Volume 48, Issue 8, pp. 2439 - 2451
Journal Article
Optics and Lasers in Engineering, ISSN 0143-8166, 01/2017, Volume 88, pp. 37 - 50
In this paper, a new chaos-based partial image encryption scheme based on Substitution-boxes (S-box) constructed by chaotic system and Linear Fractional... 
Chaos | Partial encryption | Cryptography | Linear fractional transform | S-box | Lifting-Wavelet Transform | TESTS | DESIGN | SELECTIVE ENCRYPTION | S-BOXES | CONSTRUCTION | OPTICS | SUBSTITUTION BOX | EFFICIENT
Journal Article
Optics Communications, ISSN 0030-4018, 04/2015, Volume 341, pp. 131 - 139
The increasing transmission for multimedia has induced a growing requirement for security of crucial content. Towards this direction, several selective... 
Block encryption algorithm | Selective encryption | Infrared targets | Logistic–Sine system (LSS) | Logistic-Sine system (LSS) | SYSTEM | ALGORITHM | TRANSFORM | DIFFUSION | PERMUTATION | MODEL | OPTICS | IMAGE ENCRYPTION | Multimedia | Shape | Maps | Infrared | Partial differential equations | Blocking | Encryption | Computer information security | Infrared imagery
Journal Article
IEEE Signal Processing Letters, ISSN 1070-9908, 10/2009, Volume 16, Issue 10, pp. 893 - 896
Journal Article
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, ISSN 0916-8508, 08/2015, Volume E98A, Issue 8, pp. 1760 - 1768
The MPEG-1 layer-III compressed audio format, which is widely known as MP3, is the most popular for audio distribution. However, it is not equipped with... 
MP3 | Partial encryption | Security | DRM | security | DOMAIN | COMPUTER SCIENCE, HARDWARE & ARCHITECTURE | AUDIO WATERMARKING | COMPUTER SCIENCE, INFORMATION SYSTEMS | DIGITAL AUDIO | STANDARD | partial encryption | ENGINEERING, ELECTRICAL & ELECTRONIC
Journal Article
Journal of Internet Technology, ISSN 1607-9264, 2018, Volume 19, Issue 3, pp. 807 - 814
The digital watermark technology is widely used in copyright protection. However, with the rapid increasing of user demands and the explosive growth of data,... 
Distribution outsourcing | Discrete wavelet transform | Partial encryption | Digital watermark | DIGITAL WATERMARKING | COMPUTER SCIENCE, INFORMATION SYSTEMS | SECURE | ALGORITHMS | TELECOMMUNICATIONS | EFFICIENT
Journal Article
Pattern Recognition, ISSN 0031-3203, 2005, Volume 38, Issue 7, pp. 1111 - 1115
An efficient, secure color image coder incorporating Color-SPIHT (C-SPIHT) compression and partial encryption is presented. Confidentiality of the image data... 
Image encryption | Secure SPIHT | Secure wavelet based coding | Partial encryption | Secure coding | secure coding | secure wavelet based coding | image encryption | secure SPIHT | COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE | partial encryption | ENGINEERING, ELECTRICAL & ELECTRONIC | Image coding | Algorithms
Journal Article
Security and Communication Networks, ISSN 1939-0114, 08/2016, Volume 9, Issue 12, pp. 1717 - 1725
Searchable encryption allows us to perform a keyword search over encrypted data. However, we cannot efficiently perform some complex search (e.g., a wildcard... 
Bloom filter | wildcard search | symmetric encryption | partial‐matching search | searchable encryption | partial-matching search | QUERIES | COMPUTER SCIENCE, INFORMATION SYSTEMS | TELECOMMUNICATIONS | Mobile devices | Smartphones | Availability | Searching | Tablet computers | Feasibility | Encryption | Communication networks | Symmetry
Journal Article
Mathematical and Computer Modelling, ISSN 0895-7177, 06/2013, Volume 57, Issue 11-12, pp. 2613 - 2624
Partial encryption, also named selective encryption, is regarded as a suitable choice for multimedia content encryption because of the properties of time... 
Partial encryption | Multimedia content encryption | Security analysis | DRM | MATHEMATICS, APPLIED | Regulatory compliance | Analysis
Journal Article
Defence Science Journal, ISSN 0011-748X, 2012, Volume 62, Issue 1, pp. 46 - 50
Conventional encryption techniques are usually applicable for text data and often unsuited for encrypting multimedia objects for two reasons. Firstly, the huge... 
Lossy compression | Partial encryption | Space-filling curves | Light-weight encryption | light-weight encryption | COMPRESSION | lossy compression | MULTIDISCIPLINARY SCIENCES | partial encryption | Data encryption | Image processing systems
Journal Article
IEICE Transactions on Information and Systems, ISSN 0916-8532, 2013, Volume E96.D, Issue 11, pp. 2333 - 2343
Journal Article
Pattern Recognition, ISSN 0031-3203, 2006, Volume 39, Issue 8, pp. 1509 - 1517
Journal Article
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.