An index based searchable encryption scheme with IND-CCA security
Also available in printed version : QA76.9.A25 M357 2014 raf
| Main Author: | Majid Nateghizad |
|---|---|
| Other Authors: | Mohd. Aizaini Maarof, supervisor |
| Format: | Master's thesis |
| Language: | English |
| Published: |
Universiti Teknologi Malaysia
2025
|
| Subjects: | |
| Online Access: | https://utmik.utm.my/handle/123456789/114996 |
| Abstract | Abstract here |
Similar Items
Flat role based access control and encryption scheme for database security
by: Al Farissi
Published: (2025)
by: Al Farissi
Published: (2025)
Versatile enhanced encryption process (VEEP) for improved security in general purpose embedded device communication
by: Muhammad Farhan Abu Bakar
Published: (2025)
by: Muhammad Farhan Abu Bakar
Published: (2025)
Preventing web defacement using encryption technique
by: Mazuin Nihar Noor Ali
Published: (2025)
by: Mazuin Nihar Noor Ali
Published: (2025)
Optimize perceptuality of digital image from encryption based on quadtree
by: Hussein A. Hussein
Published: (2025)
by: Hussein A. Hussein
Published: (2025)
Tamper detection of qur�anic text watermarking scheme based on vowel letters with Kashida using exclusive-or and queueing technique
by: Ali Abdulraheem Alwan Al-Khafaji Razak
Published: (2025)
by: Ali Abdulraheem Alwan Al-Khafaji Razak
Published: (2025)
Enhance key generator of data encryption standard (DES)
by: Mahan Niknafskermani
Published: (2025)
by: Mahan Niknafskermani
Published: (2025)
E-mail encryption framework for Malaysian public sector
by: Rohayu A. Wahid
Published: (2025)
by: Rohayu A. Wahid
Published: (2025)
Enhancing the security of high payload image steganography using chaos
by: Rezza Moieni
Published: (2025)
by: Rezza Moieni
Published: (2025)
The encryption - decryption of the column level for a commercial DBMS with supporting user interface
Published: (2025)
Published: (2025)
The encryption - decryption of the column level for a commercial DBMS with supporting user interface
Published: (2025)
Published: (2025)
The robust steganography technique based on location look-up table (LLUT)
by: Abdulrashid Abba Ali
Published: (2025)
by: Abdulrashid Abba Ali
Published: (2025)
Encryption and decryption for JPEG - Lossless, targa & bitmap image file format using blowfish & SEF algorithm
by: Then, Siaw Cheik
Published: (2025)
by: Then, Siaw Cheik
Published: (2025)
An Enhanced Distribution Transforming Encoder (Dte) Of The Honey Encryption Scheme For Reinforcing Text-Based Encryption
by: Omolara, Abiodun Esther
Published: (2020)
by: Omolara, Abiodun Esther
Published: (2020)
Efficiency key generation management in a big organization for symmetric cryptography system
by: Atefeh Mirzaee
Published: (2025)
by: Atefeh Mirzaee
Published: (2025)
Implementation of PKCS11 and PKCS12 cryptographic functions in.net for scan associates
by: Pirooz Kiani Kori
Published: (2025)
by: Pirooz Kiani Kori
Published: (2025)
A robust image watermarking technique based on Cox 's DCT to against rotation attack
by: Seyed Mohamad Bagher Shafieinasab Langeroudi
Published: (2025)
by: Seyed Mohamad Bagher Shafieinasab Langeroudi
Published: (2025)
Robust color image watermarking using discrete wavelet transform, discrete cosine transform and cat face transform
by: Amir Hesam Yaribakht Razak
Published: (2025)
by: Amir Hesam Yaribakht Razak
Published: (2025)
Implementing prototype method for electronic payment facility of certificate servicing system in MAA Takaful
by: Priya Kasi
Published: (2025)
by: Priya Kasi
Published: (2025)
Designing lightweight cryptography algorithm for internet of things
by: Mohd. Fairus Mustapha
Published: (2025)
by: Mohd. Fairus Mustapha
Published: (2025)
An improved image steganography scheme based on distinction grade value and secret message encryption
by: Mustafa Sabah Taha
Published: (2025)
by: Mustafa Sabah Taha
Published: (2025)
Two Novel E-Visas Verification Schemes Based On
Public Key Infrastructure (Pki) And Identity Based
Encryption (Ibe).
by: Abuadhmah, Najlaa Abdullah
Published: (2010)
by: Abuadhmah, Najlaa Abdullah
Published: (2010)
Integration of verification in OTP cryptography for highly critical embedded system
by: Muhammad Maharoff
Published: (2025)
by: Muhammad Maharoff
Published: (2025)
An Enhanced Distribution Transforming Encoder (Dte) Of The Honey Encryption Scheme For Reinforcing Text-Based Encryption
by: Omolara, Abiodun Esther
Published: (2020)
by: Omolara, Abiodun Esther
Published: (2020)
Integrating Identity-Based Encryption (Ibe) In The Return Routability Protocol (Rrp) To Enhance Signals Security
In Mobile Ipv6.
by: S. Alsayfi, Majed Salam
Published: (2010)
by: S. Alsayfi, Majed Salam
Published: (2010)
Performance comparison encryption of IPSEC VPN encryption techniques / Nur Hasyimah Mohd Ridzuan
by: Mohd Ridzuan, Nur Hasyimah
Published: (2015)
by: Mohd Ridzuan, Nur Hasyimah
Published: (2015)
Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh
by: Mohammed Saleh, Mohammed Ahmed
Published: (2016)
by: Mohammed Saleh, Mohammed Ahmed
Published: (2016)
An Approach To Enhance Image Encryption Using Block-Based Trasformation Algorithm.
by: Younes, Mohammad Ali Moh'd Bani
Published: (2009)
by: Younes, Mohammad Ali Moh'd Bani
Published: (2009)
Proposing guidelines for improving information assurance awareness based on information security awareness measurement framework
by: Heng, Shun Ling
Published: (2025)
by: Heng, Shun Ling
Published: (2025)
Information security behaviours in enhancing awareness
by: Sasan Karami Zadeh
Published: (2025)
by: Sasan Karami Zadeh
Published: (2025)
Data Integrity For Cloud Computing With Homomorphic Encryption
by: Awadallah, Ruba N S
Published: (2022)
by: Awadallah, Ruba N S
Published: (2022)
Information security awareness model for employees in bank Albilad
by: al-Haddad, Abdulqadeer Sheikh Aidaros
Published: (2025)
by: al-Haddad, Abdulqadeer Sheikh Aidaros
Published: (2025)
Information security governance framework implementation for intelligence department
by: Luqman Hakim Ibrahim
Published: (2025)
by: Luqman Hakim Ibrahim
Published: (2025)
Evaluating information security culture in higher learning institution
by: Mehrdad Mansouri
Published: (2025)
by: Mehrdad Mansouri
Published: (2025)
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
by: Syed Adnan, Syed Farid
Published: (2019)
by: Syed Adnan, Syed Farid
Published: (2019)
A comparative study on image encryption based on 2D Chaotic Map
by: Nik Nur Syahirah Nik Rahim
Published: (2025)
by: Nik Nur Syahirah Nik Rahim
Published: (2025)
An ensemble-based anomaly-behavioural crypto-ransomware pre-encryption detection model
by: Al-Rimy, Bander Ali Saleh
Published: (2025)
by: Al-Rimy, Bander Ali Saleh
Published: (2025)
Factors affecting the information security awareness in Maldives customs service
by: Ibrahim Naaif
Published: (2025)
by: Ibrahim Naaif
Published: (2025)
A security awareness model of data leakage prevention in private sector
by: Ain'natul Mardhiah Mohamad Hasbullah
Published: (2025)
by: Ain'natul Mardhiah Mohamad Hasbullah
Published: (2025)
Online consecutive secure multi-party computation algorithm for preserving privacy
by: Abdolreza Rasouli Kenari
Published: (2025)
by: Abdolreza Rasouli Kenari
Published: (2025)
Information security awareness and training program study on Wahda Bank-Libya
by: Abubaker Essid Abuhtera
Published: (2025)
by: Abubaker Essid Abuhtera
Published: (2025)
Similar Items
-
Flat role based access control and encryption scheme for database security
by: Al Farissi
Published: (2025) -
Versatile enhanced encryption process (VEEP) for improved security in general purpose embedded device communication
by: Muhammad Farhan Abu Bakar
Published: (2025) -
Preventing web defacement using encryption technique
by: Mazuin Nihar Noor Ali
Published: (2025) -
Optimize perceptuality of digital image from encryption based on quadtree
by: Hussein A. Hussein
Published: (2025) -
Tamper detection of qur�anic text watermarking scheme based on vowel letters with Kashida using exclusive-or and queueing technique
by: Ali Abdulraheem Alwan Al-Khafaji Razak
Published: (2025)