共 50 条
- [41] Database Security Using Encryption [J]. 2015 1ST INTERNATIONAL CONFERENCE ON FUTURISTIC TRENDS ON COMPUTATIONAL ANALYSIS AND KNOWLEDGE MANAGEMENT (ABLAZE), 2015, : 353 - 358
- [42] Security of signed ElGamal encryption [J]. ADVANCES IN CRYPTOLOGY ASIACRYPT 2000, PROCEEDINGS, 2000, 1976 : 73 - 89
- [43] Homomorphic encryption with CCA security [J]. AUTOMATA, LANGUAGES AND PROGRAMMING, PT 2, PROCEEDINGS, 2008, 5126 : 667 - 678
- [44] ON MULTIPLE ENCRYPTION SECURITY - REPLY [J]. COMMUNICATIONS OF THE ACM, 1981, 24 (11) : 776 - 776
- [45] Video encryption for security surveillance [J]. 41ST ANNUAL IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2007, : 207 - +
- [46] Security Issues of Biometric Encryption [J]. IEEE TIC-STH 09: 2009 IEEE TORONTO INTERNATIONAL CONFERENCE: SCIENCE AND TECHNOLOGY FOR HUMANITY, 2009, : 34 - 39
- [47] Security processor for bulk encryption [J]. 16TH INTERNATIONAL CONFERENCE ON MICROELECTRONICS, PROCEEDINGS, 2004, : 446 - 449
- [48] On the security of the WinRAR encryption method [J]. INFORMATION SECURITY, PROCEEDINGS, 2005, 3650 : 402 - 416
- [49] Adaptive security of symbolic encryption [J]. THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2005, 3378 : 169 - 187
- [50] Computational Security of Quantum Encryption [J]. INFORMATION THEORETIC SECURITY, ICITS 2016, 2016, 10015 : 47 - 71