1![Microsoft PowerPoint - ch5.ppt [相容模式] Microsoft PowerPoint - ch5.ppt [相容模式]](https://www.pdfsearch.io/img/ce25399442fcba161a6f35a8f560fb69.jpg) | Add to Reading ListSource URL: people.cs.nctu.edu.twLanguage: English - Date: 2012-08-25 21:38:28
|
---|
2![Microsoft PowerPoint - Geoencryption Authentication Di Qiu May 2006.ppt Microsoft PowerPoint - Geoencryption Authentication Di Qiu May 2006.ppt](https://www.pdfsearch.io/img/271805bd401c8f37f72390f117e3a76b.jpg) | Add to Reading ListSource URL: gps.stanford.eduLanguage: English - Date: 2006-06-13 19:25:54
|
---|
3![Threshold Encryption into Multiple Ciphertexts Martin Stanek Department of Computer Science Comenius University Threshold Encryption into Multiple Ciphertexts Martin Stanek Department of Computer Science Comenius University](https://www.pdfsearch.io/img/051f413bdb739e03740b385943ceb674.jpg) | Add to Reading ListSource URL: fps2011.dyndns.orgLanguage: English |
---|
4![Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with Multiple Data Owners Frank Li† † Richard Shin† Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with Multiple Data Owners Frank Li† † Richard Shin†](https://www.pdfsearch.io/img/53b0901ada62b32b9d7de00bd22b5dbe.jpg) | Add to Reading ListSource URL: www.icir.orgLanguage: English - Date: 2015-10-01 22:05:30
|
---|
5![Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with Multiple Data Owners Frank Li Richard Shin Vern Paxson Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with Multiple Data Owners Frank Li Richard Shin Vern Paxson](https://www.pdfsearch.io/img/df0c9413e46723a577c75a0d492ee55e.jpg) | Add to Reading ListSource URL: www.eecs.berkeley.eduLanguage: English - Date: 2015-07-29 20:02:16
|
---|
6![Efficient Searchable Symmetric Encryption for Storing Multiple Source Data on Cloud † Faculty Chang Liu† , Liehuang Zhu‡ , and Jinjun Chen† , Efficient Searchable Symmetric Encryption for Storing Multiple Source Data on Cloud † Faculty Chang Liu† , Liehuang Zhu‡ , and Jinjun Chen† ,](https://www.pdfsearch.io/img/daac1c43f14eedefb67dac03bc25376a.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2015-04-20 04:09:39
|
---|
7![Nippon Telegraph and Telephone Corporation Mitsubishi Electric Corporation New Authenticated Encryption Algorithm Features Robust Resistance to Multiple Misuse TOKYO, March 17, 2014 – Nippon Telegraph and Telephone Cor Nippon Telegraph and Telephone Corporation Mitsubishi Electric Corporation New Authenticated Encryption Algorithm Features Robust Resistance to Multiple Misuse TOKYO, March 17, 2014 – Nippon Telegraph and Telephone Cor](https://www.pdfsearch.io/img/59680251e72f63c013b1f963a79f6472.jpg) | Add to Reading ListSource URL: www.mitsubishielectric.comLanguage: English - Date: 2015-02-03 21:03:02
|
---|
8![Microsoft Word - Weakness of shim’s New ID-based tripartite multiple-key agreement protocol最終版.doc Microsoft Word - Weakness of shim’s New ID-based tripartite multiple-key agreement protocol最終版.doc](https://www.pdfsearch.io/img/7eca0a43c57fd6364e478508b392600b.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2005-12-13 03:19:10
|
---|
9![Differential Fault Analysis of AES using a Single Multiple-Byte Fault Subidh Ali1 , Debdeep Mukhopadhyay1, and Michael Tunstall2 1 Department of Computer Sc. and Engg, IIT Kharagpur, West Bengal, India. Differential Fault Analysis of AES using a Single Multiple-Byte Fault Subidh Ali1 , Debdeep Mukhopadhyay1, and Michael Tunstall2 1 Department of Computer Sc. and Engg, IIT Kharagpur, West Bengal, India.](https://www.pdfsearch.io/img/3a9732ff8b36b3ad43a86daafaf9a325.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2010-12-14 06:50:46
|
---|
10![Data Encryption Systems announces major addition to award-winning DESlock+ New version offers multiple software encryption keys and increased administrative capability Taunton, UK 20th September 2005 – Data Encryption Data Encryption Systems announces major addition to award-winning DESlock+ New version offers multiple software encryption keys and increased administrative capability Taunton, UK 20th September 2005 – Data Encryption](https://www.pdfsearch.io/img/caeacb44b58f3b1dd108e66a01f45255.jpg) | Add to Reading ListSource URL: download.deslock.comLanguage: English - Date: 2014-05-01 10:03:18
|
---|