Video blanket: Selective scene encryption and user access using hybrid key cryptography
Various cryptographic techniques are applied extensively for the encryption and concealment of sensitive information- to ensure the security of data. Two of specific branches of cryptography are symmetric key cryptography and asymmetric key cryptography, both of which use secret keys for encryption...
Saved in:
Main Authors: | Ching, Jensen Bryan S., Co, Louise Lorraine G., See, Karol Ann O., Uy, Riva Loren D. |
---|---|
Format: | text |
Language: | English |
Published: |
Animo Repository
2008
|
Online Access: | https://animorepository.dlsu.edu.ph/etd_bachelors/14439 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | De La Salle University |
Language: | English |
Similar Items
-
RASKES : a random access symmetric-key encryption system
by: Liu, Pengbo.
Published: (2008) -
Codes for key generation in quantum cryptography
by: Englert, B.-G., et al.
Published: (2014) -
PUBLIC-KEY CRYPTOGRAPHY AND DISCRETE LOGARITHMS
by: ZHAO JING
Published: (2021) -
Cryptanalysis and design of lightweight symmetric-key cryptography
by: Sim, Siang Meng
Published: (2018) -
Learn cryptography encryption and decryption by building convolutional neural networks (CNNs)
by: Cai, Yu
Published: (2023)