9 results for decryption.

Parameters for your search query:
Keyword    decryption

Open AccessArticle
Export: RIS | BibTeX | EndNote
ASP: Advanced Security Protocol for Security and Privacy in Cloud Computing
American Journal of Information Systems. 2016, 4(2), 17-31. DOI: 10.12691/ajis-4-2-1
Pub. Date: March 16, 2016Views: 15265Downloads: 13299Citations: 1
Figure of 9
Open AccessArticle
Export: RIS | BibTeX | EndNote
Comparative Analysis of Block Cipher-Based Encryption Algorithms: A Survey
Information Security and Computer Fraud. 2015, 3(1), 1-7. DOI: 10.12691/iscf-3-1-1
Pub. Date: June 23, 2015Views: 25507Downloads: 21000
Open AccessArticle
Export: RIS | BibTeX | EndNote
DecenCrypto Cloud: Decentralized Cryptography Technique for Secure Communication over the Clouds
Journal of Computer Sciences and Applications. 2015, 3(3), 73-78. DOI: 10.12691/jcsa-3-3-3
Pub. Date: June 10, 2015Views: 7378Downloads: 5543Citations: 6
Open AccessArticle
Export: RIS | BibTeX | EndNote
Multilevel Network Security Combining Cryptography and Steganography on ARM Platform
Journal of Embedded Systems. 2015, 3(1), 11-15. DOI: 10.12691/jes-3-1-2
Pub. Date: March 22, 2015Views: 13087Downloads: 10770
Open AccessArticle
Export: RIS | BibTeX | EndNote
Solution to Black Hole Attack in Ad Hoc on Demand Distance Vector Routing Protocol
Journal of Computer Sciences and Applications. 2015, 3(4), 90-93. DOI: 10.12691/jcsa-3-4-1
Pub. Date: September 03, 2015Views: 13218Downloads: 9245
Figure of 3
Open AccessResearch Article
Export: RIS | BibTeX | EndNote
Cryptography during Data Sharing and Accessing Over Cloud
International Transaction of Electrical and Computer Engineers System. 2015, 3(1), 12-18. DOI: 10.12691/iteces-3-1-2
Pub. Date: March 24, 2015Views: 9070Downloads: 6234Citations: 9
This article belongs to the Special Issue Special issue on Cryptography & Network Security
Open AccessResearch Article
Export: RIS | BibTeX | EndNote
Review on Network Security and Cryptography
International Transaction of Electrical and Computer Engineers System. 2015, 3(1), 1-11. DOI: 10.12691/iteces-3-1-1
Pub. Date: March 24, 2015Views: 36783Downloads: 17617Citations: 13
This article belongs to the Special Issue Special issue on Cryptography & Network Security
Open AccessArticle
Export: RIS | BibTeX | EndNote
Simplified Verifiable Re-encryption Mix-nets
Information Security and Computer Fraud. 2013, 1(1), 1-7. DOI: 10.12691/iscf-1-1-1
Pub. Date: March 14, 2013Views: 11968Downloads: 6423
Figure of 2
Open AccessReview Article
Export: RIS | BibTeX | EndNote
A Survey on Secure Cloud: Security and Privacy in Cloud Computing
American Journal of Systems and Software. 2016, 4(1), 14-26. DOI: 10.12691/ajss-4-1-2
Pub. Date: January 31, 2016Views: 14362Downloads: 9909Citations: 3
Results: sort by Relevance

Filter by

Date

Published between:

and

Subjects


Journals






Article Types