New Directions in Commercial Secrecy and Encryption Protocols
Secure transmission of bulk data is of interest to many content providers. A commercially-viable distribution of content requires technology to prevent unauthorised access. Encryption tools are powerful, but have a performance cost. Without encryption, intercepted data may be illicitly duplicated an...
| Main Author: | Ashman, Helen |
|---|---|
| Format: | Conference or Workshop Item |
| Published: |
2001
|
| Online Access: | https://eprints.nottingham.ac.uk/294/ |
Similar Items
And now for something completely different: looking ahead to new encryption and secrecy protocols
by: Ashman, Helen, et al.
Published: (2001)
by: Ashman, Helen, et al.
Published: (2001)
The Cost of Secrecy - The Experience of the Adoptee in Step-Father Adoption
by: Griffiths-Smith, Shirley, et al.
Published: (2008)
by: Griffiths-Smith, Shirley, et al.
Published: (2008)
Banking secrecy in Malaysia: a legal myth / Abd. Razak Said
by: Said, Abd. Razak
Published: (1987)
by: Said, Abd. Razak
Published: (1987)
Cryptographic keys from dynamic hand-signatures with biometric secrecy preservation and replaceability
by: Kuan, , YW, et al.
Published: (2005)
by: Kuan, , YW, et al.
Published: (2005)
A New Image-Database Encryption Based on A Hybrid Approach of Data-at-Rest and Data-in-Motion Encryption Protocol.
by: Ooi, Bee Sien, et al.
Published: (2004)
by: Ooi, Bee Sien, et al.
Published: (2004)
The encryption - decryption of the column level for a commercial DBMS with supporting user interface
by: Elfadil, Sabeil Mohamed Ali
Published: (2009)
by: Elfadil, Sabeil Mohamed Ali
Published: (2009)
The development of a commercially viable database encryption tool for Oracle8i Rdbms
by: Kama, Mohd. Nazri, et al.
Published: (2005)
by: Kama, Mohd. Nazri, et al.
Published: (2005)
Randomized text encryption: a new dimension in cryptography
by: Memon, Jamshed, et al.
Published: (2014)
by: Memon, Jamshed, et al.
Published: (2014)
A new encryption algorithm over elliptic curve
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Analysis for McEliece and Niederreiter Encryptions: An Alternative to Public Key Encryption
by: Chaw, Lian Foong
Published: (2018)
by: Chaw, Lian Foong
Published: (2018)
Encryption using FPGA
by: Nor Robaini, Ibrahim
Published: (2008)
by: Nor Robaini, Ibrahim
Published: (2008)
Image compression and encryption
by: Zainal Abidin, Zuhairiah
Published: (2003)
by: Zainal Abidin, Zuhairiah
Published: (2003)
Symmetric encryption using preshared public parameters for a secure TFTP protocol / Nur Nabila Mohamed
by: Mohamed, Nur Nabila
Published: (2015)
by: Mohamed, Nur Nabila
Published: (2015)
New Image Encryption and Compression Method Based on Independent Component Analysis
by: Alfalou, A., et al.
Published: (2008)
by: Alfalou, A., et al.
Published: (2008)
Enhancing selective encryption for H.264/AVC using advanced encryption standard
by: Abomhara, Mohamed, et al.
Published: (2010)
by: Abomhara, Mohamed, et al.
Published: (2010)
Performance evaluation of identity-based encryption (IBE) remote attestation protocol in wireless sensor networks / Roszainiza Rosli
by: Rosli, Roszainiza
Published: (2014)
by: Rosli, Roszainiza
Published: (2014)
Video encryption using computation between H.264/AVC and AES encryption algorithm
by: Omar zakaria, Mohamed Abomhara, et al.
Published: (2011)
by: Omar zakaria, Mohamed Abomhara, et al.
Published: (2011)
New IV-Based database encryption scheme
using TS block cipher
by: Zailani Mohamad Sidek,, et al.
Published: (2004)
by: Zailani Mohamad Sidek,, et al.
Published: (2004)
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
by: Norhidayah, Muhammad, et al.
Published: (2012)
by: Norhidayah, Muhammad, et al.
Published: (2012)
A new secure storing system for biometric templates based encryption and concealment
by: Khalaf, Emad Taha, et al.
Published: (2015)
by: Khalaf, Emad Taha, et al.
Published: (2015)
An overview of video encryption techniques
by: Abomhara, Mohamed, et al.
Published: (2010)
by: Abomhara, Mohamed, et al.
Published: (2010)
Multimedia encryption, transmission and authentication
Published: (2011)
Published: (2011)
Data Encryption Standard (DES)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
Advanced Encryption Standard (AES)
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
Video streaming and encrypting algorithms
by: Abumuala, Muhammad, et al.
Published: (2011)
by: Abumuala, Muhammad, et al.
Published: (2011)
Impact of Encryption on Qos in Voip
by: Radmand, Pedram, et al.
Published: (2010)
by: Radmand, Pedram, et al.
Published: (2010)
Text messaging encryption system
by: Sundara Morthty, Nirmala Devi
Published: (2012)
by: Sundara Morthty, Nirmala Devi
Published: (2012)
Enhancing cloud data security using hybrid of advanced encryption standard and Blowfish encryption algorithms
by: -, Salma, et al.
Published: (2019)
by: -, Salma, et al.
Published: (2019)
An Enhanced Distribution Transforming Encoder (Dte) Of The Honey Encryption Scheme For Reinforcing Text-Based Encryption
by: Omolara, Abiodun Esther
Published: (2020)
by: Omolara, Abiodun Esther
Published: (2020)
Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm
by: Lim, Mui Liang
Published: (2006)
by: Lim, Mui Liang
Published: (2006)
An Enhanced Distribution Transforming Encoder (Dte) Of The Honey Encryption Scheme For Reinforcing Text-Based Encryption
by: Omolara, Abiodun Esther
Published: (2020)
by: Omolara, Abiodun Esther
Published: (2020)
Integrating Identity-Based Encryption (Ibe) In The Return Routability Protocol (Rrp) To Enhance Signals Security
In Mobile Ipv6.
by: S. Alsayfi, Majed Salam
Published: (2010)
by: S. Alsayfi, Majed Salam
Published: (2010)
A new CCA-secure encryption based on the Gap Hashed Diffie-Hellman problem
by: Asbullah, Muhammad Asyraf, et al.
Published: (2013)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2013)
A new tv-based database encryption scheme using ts block cipher
by: Mohamed Sidek, Zailani, et al.
Published: (2004)
by: Mohamed Sidek, Zailani, et al.
Published: (2004)
On the security defects of an image encryption scheme
by: C., Li, et al.
Published: (2009)
by: C., Li, et al.
Published: (2009)
An improved chaotic image encryption algorithm
by: Al-Khasawneh, Mahmoud Ahmad, et al.
Published: (2018)
by: Al-Khasawneh, Mahmoud Ahmad, et al.
Published: (2018)
Performance analysis for cloud query encryption
by: Ali Raheem, Zainalabideen, et al.
Published: (2019)
by: Ali Raheem, Zainalabideen, et al.
Published: (2019)
Hardware prototyping of an efficient encryption engine
by: Ibrahimy, Muhammad Ibn, et al.
Published: (2010)
by: Ibrahimy, Muhammad Ibn, et al.
Published: (2010)
Hardware prototyping of an efficient encryption engine
by: Ibrahimy, Muhammad Ibn, et al.
Published: (2009)
by: Ibrahimy, Muhammad Ibn, et al.
Published: (2009)
Encryption method for SCADA security enhancement
by: Shahzad, Aamir, et al.
Published: (2014)
by: Shahzad, Aamir, et al.
Published: (2014)
Similar Items
-
And now for something completely different: looking ahead to new encryption and secrecy protocols
by: Ashman, Helen, et al.
Published: (2001) -
The Cost of Secrecy - The Experience of the Adoptee in Step-Father Adoption
by: Griffiths-Smith, Shirley, et al.
Published: (2008) -
Banking secrecy in Malaysia: a legal myth / Abd. Razak Said
by: Said, Abd. Razak
Published: (1987) -
Cryptographic keys from dynamic hand-signatures with biometric secrecy preservation and replaceability
by: Kuan, , YW, et al.
Published: (2005) -
A New Image-Database Encryption Based on A Hybrid Approach of Data-at-Rest and Data-in-Motion Encryption Protocol.
by: Ooi, Bee Sien, et al.
Published: (2004)