Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 35 matches
- 2024
- Yuqian Yan, Yue Wang, Linlin Xue, Weiwei Qiu, Zhongpeng Wang:
2D compressed sensing of encrypted images based on complex-valued measurement matrix. IET Image Process. 18(3): 572-588 (2024) - Fang Ren, Yanli Hao, Kexin Pang, Ziyi Wu:
Reversible data hiding scheme in encrypted images based on homomorphic encryption and pixel value ordering. Multim. Tools Appl. 83(14): 40607-40627 (2024) - Chen Zhang, Qingyuan Xie, Mingyue Wang, Yu Guo, Xiaohua Jia:
Optimal Compression for Encrypted Key-Value Store in Cloud Systems. IEEE Trans. Computers 73(3): 928-941 (2024) - Chen Zhang, Yulong Ming, Mingyue Wang, Yu Guo, Xiaohua Jia:
Encrypted and Compressed Key-Value Store With Pattern-Analysis Security in Cloud Systems. IEEE Trans. Inf. Forensics Secur. 19: 221-234 (2024) - Ye Yao, Ke Wang, Qi Chang, Shaowei Weng:
Reversible Data Hiding in Encrypted Images Using Global Compression of Zero-Valued High Bit-Planes and Block Rearrangement. IEEE Trans. Multim. 26: 3701-3714 (2024) - Tao Zhang, Ju Zhang, Yicheng Zou, Yu Zhang:
High Capacity Reversible Data Hiding in Encrypted Images Based on Pixel Value Preprocessing and Block Classification. MMM (2) 2024: 14-27 - 2023
- Yaomin Wang, Gangqiang Xiong, Wenguang He:
High-capacity reversible data hiding in encrypted images based on pixel-value-ordering and histogram shifting. Expert Syst. Appl. 211: 118600 (2023) - Arun Kumar Rai, Hari Om, Satish Chand, Saurabh Agarwal:
Reversible data hiding in encrypted image using two-pass pixel value ordering. J. Inf. Secur. Appl. 76: 103545 (2023) - Haoyang Yu, Junwei Zhang, Zixiao Xiang, Biao Liu, Huamin Feng:
Lossless Reversible Data Hiding in Encrypted Image for Multiple Data Hiders Based on Pixel Value Order and Secret Sharing. Sensors 23(10): 4865 (2023) - Junseung You, Kyeongryong Lee, Hyungon Moon, Yeongpil Cho, Yunheung Paek:
KVSEV: A Secure In-Memory Key-Value Store with Secure Encrypted Virtualization. SoCC 2023: 233-248 - 2022
- Konduru Upendra Raju, Amutha Prabha Nagarajan:
Error-free and mean value based reversible data hiding using gravitational search algorithm in encrypted images. Multim. Tools Appl. 81(21): 30749-30768 (2022) - Shanshan Li, Chunxiang Xu, Yuan Zhang, Yicong Du, Xinsheng Wen, Kefei Chen, Jianfeng Ma:
Efficient Data Retrieval Over Encrypted Attribute-Value Type Databases in Cloud-Assisted Ehealth Systems. IEEE Syst. J. 16(2): 3096-3107 (2022) - Chen Zhang, Qingyuan Xie, Yinbin Miao, Xiaohua Jia:
K-Indistinguishable Data Access for Encrypted Key-Value Stores. ICDCS 2022: 1144-1154 - Peijia Zheng, Zhiwei Cai, Huicong Zeng, Jiwu Huang:
Keyword Spotting in the Homomorphic Encrypted Domain Using Deep Complex-Valued CNN. ACM Multimedia 2022: 1474-1483 - 2021
- Asha Jose, Kamalraj Subramanian:
High-capacity reversible data hiding using quotient multi pixel value differencing scheme in encrypted images by fuzzy based encryption. Multim. Tools Appl. 80(19): 29453-29479 (2021) - Limin Sun, Shili Liang, Peipei Chen, Yixin Chen:
Encrypted digital watermarking algorithm for quick response code using discrete cosine transform and singular value decomposition. Multim. Tools Appl. 80(7): 10285-10300 (2021) - Jihoon Suh, Takashi Tanaka:
Encrypted Value Iteration and Temporal Difference Learning over Leveled Homomorphic Encryption. ACC 2021: 2555-2561 - Raoul R. Nigmatullin, Alexander Ivchenko, Semyon Dorokhin:
Accumulated Generalized Mean Value - a New Approach to Flow-Based Feature Generation for Encrypted Traffic Characterization. CCWC 2021: 165-169 - Jihoon Suh, Takashi Tanaka:
Encrypted Value Iteration and Temporal Difference Learning over Leveled Homomorphic Encryption. CoRR abs/2103.11065 (2021) - 2020
- Min Long, Yu Zhao, Xiang Zhang, Fei Peng:
A separable reversible data hiding scheme for encrypted images based on Tromino scrambling and adaptive pixel value ordering. Signal Process. 176: 107703 (2020) - Archita Agarwal, Seny Kamara:
Encrypted Key-Value Stores. INDOCRYPT 2020: 62-85 - 2019
- Mohsin Shah, Weiming Zhang, Honggang Hu, Nenghai Yu:
Paillier Cryptosystem based Mean Value Computation for Encrypted Domain Image Processing Operations. ACM Trans. Multim. Comput. Commun. Appl. 15(3): 76:1-76:21 (2019) - Yu Guo, Xingliang Yuan, Xinyu Wang, Cong Wang, Baochun Li, Xiaohua Jia:
Enabling Encrypted Rich Queries in Distributed Key-Value Stores. IEEE Trans. Parallel Distributed Syst. 30(6): 1283-1297 (2019) - 2018
- Yu Liu, Bailong Yang, Wenqiang Zhao, Zhihua Yuan:
基于自适应块参照值的密文域可逆信息隐藏 (Adaptive Pixel Block Reference Value Based Reversible Data Hiding in Encrypted Domain). 计算机科学 45(8): 151-155 (2018) - Xianyi Chen, Haidong Zhong, Lizhi Xiong, Zhihua Xia:
Improved Encrypted-Signals-Based Reversible Data Hiding Using Code Division Multiplexing and Value Expansion. Secur. Commun. Networks 2018: 1326235:1-1326235:9 (2018) - 2017
- Di Xiao, Yanping Xiang, Hongying Zheng, Yong Wang:
Separable reversible data hiding in encrypted image based on pixel value ordering and additive homomorphism. J. Vis. Commun. Image Represent. 45: 1-10 (2017) - Xingliang Yuan, Yu Guo, Xinyu Wang, Cong Wang, Baochun Li, Xiaohua Jia:
EncKV: An Encrypted Key-value Store with Rich Queries. AsiaCCS 2017: 423-435 - 2016
- Xingliang Yuan, Xinyu Wang, Cong Wang, Chen Qian, Jianxiong Lin:
Building an Encrypted, Distributed, and Searchable Key-value Store. AsiaCCS 2016: 547-558 - 2015
- Sushil Jajodia, Witold Litwin, Thomas J. E. Schwarz:
Numerical SQL Value Expressions Over Encrypted Cloud Databases. DEXA (2) 2015: 455-478 - Benjamin Mood, Debayan Gupta, Kevin R. B. Butler, Joan Feigenbaum:
Reuse It Or Lose It: More Efficient Secure Computation Through Reuse of Encrypted Values. CoRR abs/1506.02954 (2015)
skipping 5 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-10 21:59 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint