Browsing by Subject "encryption"
Now showing items 1-2 of 2
-
(2016-08-30)Standard encryption protocols do not allow for native searching or modification of data, without decryption. In this scenario, whoever is performing the operations on this file must also have the encryption key. Homomorphic ...
-
(2016-04-12)Near Field Communication (NFC) is an RFID based proximity communication technology. The extensive use of NFC technology for popular and sensitive applications such as financial transactions and content sharing necessitates ...