Search Results

There are 18926 results for: content related to: On the choice of the appropriate AES data encryption method for ZigBee nodes

  1. Encryption Techniques for H.264 Video

    Handbook of MPEG Applications: Standards in Practice, The

    Bai-Ying Lei, Kwok-Tung Lo, Jian Feng, Pages: 151–173, 2010

    Published Online : 4 OCT 2010, DOI: 10.1002/9780470974582.ch6

  2. New packing method in somewhat homomorphic encryption and its applications

    Security and Communication Networks

    Volume 8, Issue 13, 10 September 2015, Pages: 2194–2213, Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama and Takeshi Koshiba

    Version of Record online : 12 JAN 2015, DOI: 10.1002/sec.1164

  3. Advanced Encryption Standard-XTS implementation in field programmable gate array hardware

    Security and Communication Networks

    Volume 8, Issue 3, February 2015, Pages: 516–522, Shakil Ahmed, Khairulmizam Samsudin, Abdul Rahman Ramli and Fakhrul Zaman Rokhani

    Version of Record online : 3 APR 2014, DOI: 10.1002/sec.999

  4. Hybrid Coding: Encryption-Watermarking-Compression for Medical Information Security

    Compression of Biomedical Images and Signals

    William Puech, Gouenou Coatrieux, Pages: 247–275, 2010

    Published Online : 27 JAN 2010, DOI: 10.1002/9780470611159.ch10

  5. Ultra simple way to encrypt non-volatile main memory

    Security and Communication Networks

    Volume 8, Issue 7, 10 May 2015, Pages: 1155–1168, Fangyong Hou and Hongjun He

    Version of Record online : 4 AUG 2014, DOI: 10.1002/sec.1071

  6. Protect biometric data with compound chaotic encryption

    Security and Communication Networks

    Charles Z. Liew, Raymond Shaw and Lanlan Li

    Version of Record online : 15 AUG 2014, DOI: 10.1002/sec.1070

  7. Obfuscation for multi-use re-encryption and its application in cloud computing

    Concurrency and Computation: Practice and Experience

    Volume 27, Issue 8, 10 June 2015, Pages: 2170–2190, Rong Cheng and Fangguo Zhang

    Version of Record online : 1 OCT 2014, DOI: 10.1002/cpe.3399

  8. Protection of Color Images

    Digital Color

    William Puech, Alain Trémeau, Philippe Carré, Pages: 227–264, 2013

    Published Online : 6 MAR 2013, DOI: 10.1002/9781118562680.ch8

  9. Fusion: coalesced confidential storage and communication framework for the IoT

    Security and Communication Networks

    Ibrahim Ethem Bagci, Shahid Raza, Utz Roedig and Thiemo Voigt

    Version of Record online : 30 APR 2015, DOI: 10.1002/sec.1260

  10. A ciphertext-policy attribute-based proxy re-encryption scheme for data sharing in public clouds

    Concurrency and Computation: Practice and Experience

    Volume 27, Issue 8, 10 June 2015, Pages: 2004–2027, Kaitai Liang, Liming Fang, Duncan S. Wong and Willy Susilo

    Version of Record online : 13 OCT 2014, DOI: 10.1002/cpe.3397

  11. Modified data encryption standard encryption algorithm with improved error performance and enhanced security in wireless fading channels

    Security and Communication Networks

    Volume 8, Issue 4, 10 March 2015, Pages: 565–573, Walid Y. Zibideh and Mustafa M. Matalgah

    Version of Record online : 5 MAY 2014, DOI: 10.1002/sec.1003

  12. DualAcE: fine-grained dual access control enforcement with multi-privacy guarantee in DaaS

    Security and Communication Networks

    Volume 8, Issue 8, 25 May 2015, Pages: 1494–1508, Xiuxia Tian, Ling Huang, Yong Wang, Chaofeng Sha and Xiaoling Wang

    Version of Record online : 9 SEP 2014, DOI: 10.1002/sec.1098

  13. Symmetric Block Ciphers

    Wireless Mobile Internet Security, Second Edition

    Man Young Rhee, Pages: 81–160, 2013

    Published Online : 25 MAR 2013, DOI: 10.1002/9781118512920.ch4

  14. Lattice-based obfuscation for re-encryption functions

    Security and Communication Networks

    Volume 8, Issue 9, June 2015, Pages: 1648–1658, Rong Cheng and Fangguo Zhang

    Version of Record online : 19 OCT 2014, DOI: 10.1002/sec.1112

  15. An embedded DSP hardware encryption module for secure e-commerce transactions

    Security and Communication Networks

    Volume 4, Issue 8, August 2011, Pages: 902–909, J. Hu, X. D. Hoang and I. Khalil

    Version of Record online : 28 AUG 2010, DOI: 10.1002/sec.221

  16. An efficient single unit T-box/T−1-box implementation for 128-bit AES on FPGA

    Security and Communication Networks

    Volume 8, Issue 9, June 2015, Pages: 1725–1731, Dur-e-Shahwar Kundi, Arshad Aziz and Majida Kazmi

    Version of Record online : 19 DEC 2014, DOI: 10.1002/sec.1138

  17. Privacy preserving revocable predicate encryption revisited

    Security and Communication Networks

    Volume 8, Issue 3, February 2015, Pages: 471–485, Kwangsu Lee, Intae Kim and Seong Oun Hwang

    Version of Record online : 21 MAR 2014, DOI: 10.1002/sec.994

  18. Optical Data Encryption

    Optical and Digital Image Processing: Fundamentals and Applications

    Maria Sagrario Millán García-varela, Elisabet Pérez-Cabré, Pages: 739–767, 2011

    Published Online : 29 APR 2011, DOI: 10.1002/9783527635245.ch33

  19. On the application of generic CCA-secure transformations to proxy re-encryption

    Security and Communication Networks

    David Nuñez, Isaac Agudo and Javier Lopez

    Version of Record online : 19 FEB 2016, DOI: 10.1002/sec.1434

  20. Encrypting and Securely Deleting Files

    Mac® Security Bible

    Joe Kissell, Pages: 423–460, 2011

    Published Online : 1 NOV 2011, DOI: 10.1002/9781118257739.ch13