„Encrypted control“
Suchergebnisse
40 Treffer
-
Dual Optical Information‐Encrypted/Decrypted Invisible Photonic Patterns based on Controlled Wettability
-
Trustworthy computing and services – international conference ; revised selected papers
-
Privacy-preserving conjunctive keyword search on encrypted data with enhanced fine-grained access control
-
Deep packet: a novel approach for encrypted traffic classification using deep learning
-
Amount of Key Information Contained in Plain and Encrypted Text Sets of the Symmetric Randomized McEliece Cryptosystem
-
Multi-user search on the encrypted multimedia database: lattice-based searchable encryption scheme with time-controlled proxy re-encryption
-
Secure File Download over Public Cloud Platform – Achieving secure file download by traffic and energy saving encrypted search technique and generate key image using BVCS
-
Secure auditing and deduplication for encrypted cloud data supporting ownership modification
-
Privacy Preserving Time Efficient Access Control Aware Keyword Search Over Encrypted Data on Cloud Storage
-
Flexible CP-ABE Based Access Control on Encrypted Data for Mobile Users in Hybrid Cloud System
-
DMRS: an efficient dynamic multi-keyword ranked search over encrypted cloud data
-
A Reversible Data Hiding with Quality Controllable Scheme for Encrypted-Compressed Image
-
Controllable high-capacity separable data hiding in encrypted images by compressive sensing and data pretreatment
-
Detection of encrypted executable files based on entropy analysis to determine the randomness measure of byte sequences
-
Information flow control on encrypted data for service composition among multiple clouds
-
Towards efficient privacy-preserving encrypted image search in cloud computing
-
Statistical learning based fully homomorphic encryption on encrypted data
-
Patient-controlled encrypted genomic data: an approach to advance clinical genomics
-
Efficient and secure encrypted image search in mobile cloud computing
-
A QDCT- and SVD-based color image watermarking scheme using an optimized encrypted binary computer-generated hologram