Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Yu, K Add to Alert Profile  
 
Options:
Date Reviewed  
  1 - 2 of 2 reviews    
  Superimposing encrypted data
Yu K., Yu T. Communications of the ACM 34(2): 48-54, 1991.  Type: Article

The authors are concerned with the processing of encrypted data. For example, could we take an encrypted amount in hundreds of dollars and convert it to yen (that is, multiply it by a known constant, such as 12,689), thus obtaining a...
...
Aug 1 1991  
  Data encryption based upon time reversal transformations
Yu K., Yu T. The Computer Journal 32(3): 241-245, 1989.  Type: Article

This paper proposes arranging data to be encrypted into a matrix X with elements ranging from 1 to k inclusive and applying the transformation X(T + 1) = [f(X(T)) - − X(...
...
Mar 1 1990  

   
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy