Search Constraints
« Previous |
1 - 10 of 21
|
Next »
Search Results
Select an image to start the slideshow
Improving the Efficiency of Homomorphic Encryption Schemes
1 of 10
Accelerating Cryptosystems on Hardware Platforms
2 of 10
Secure and Reliable Data Outsourcing in Cloud Computing
3 of 10
User-Centric Security and Privacy Mechanisms in Untrusted Networking and Computing Environments
4 of 10
Privacy-Preserving Personal Health Record System Using Attribute-Based Encryption
5 of 10
Network Coding in Multihop Wireless Networks: Throughput Analysis and Protocol Design
6 of 10
Resource Allocation and Performance Optimization in Wireless Networks
7 of 10
Efficient Side-Channel Aware Elliptic Curve Cryptosystems over Prime Fields
8 of 10
Data Sharing on Untrusted Storage with Attribute-Based Encryption
9 of 10
An Efficient Scheme to Provide Real-time Memory Integrity Protection
10 of 10