Zeitschriftenartikel zum Thema „Advanced cryptographic techniques“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Advanced cryptographic techniques" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Abudalou, Mohammad. „Enhancing Data Security through Advanced Cryptographic Techniques“. International Journal of Computer Science and Mobile Computing 13, Nr. 1 (30.01.2024): 88–92. http://dx.doi.org/10.47760/ijcsmc.2024.v13i01.007.
Der volle Inhalt der QuelleKarantjias, Athanasios, und Nineta Polemi. „Assessment of advanced cryptographic antiviral techniques“. International Journal of Electronic Security and Digital Forensics 3, Nr. 1 (2010): 60. http://dx.doi.org/10.1504/ijesdf.2010.032331.
Der volle Inhalt der QuelleViresh, Kasheenath Babaleshwar, Karade Sinchana, N. Sakshi und Naidu Anush. „Audio encryption and decryption using AES algorithm technique“. i-manager’s Journal on Electronics Engineering 14, Nr. 2 (2024): 8. http://dx.doi.org/10.26634/jele.14.2.20486.
Der volle Inhalt der QuelleLewis, Nehama, Yaron Connelly, Gil Henkin, Max Leibovich und Adi Akavia. „Factors Influencing the Adoption of Advanced Cryptographic Techniques for Data Protection of Patient Medical Records“. Healthcare Informatics Research 28, Nr. 2 (30.04.2022): 132–42. http://dx.doi.org/10.4258/hir.2022.28.2.132.
Der volle Inhalt der QuelleHieu, Phan Duong, und Moti Yung. „PRIVACY IN ADVANCED CRYPTOGRAPHIC PROTOCOLS: PROTOTYPICAL EXAMPLES“. Journal of Computer Science and Cybernetics 37, Nr. 4 (12.10.2021): 429–51. http://dx.doi.org/10.15625/1813-9663/37/4/16104.
Der volle Inhalt der QuelleMalhotra, Anoushka, Ashwin Arora und Dr Manjot Kaur Bhatia. „Symmetric Cryptographic Approaches“. International Journal for Research in Applied Science and Engineering Technology 10, Nr. 12 (31.12.2022): 718–21. http://dx.doi.org/10.22214/ijraset.2022.47982.
Der volle Inhalt der QuelleSingh, Sukhveer. „Investigation of Cryptography for Secure Communication and Data Privacy Applications“. Mathematical Statistician and Engineering Applications 70, Nr. 1 (31.01.2021): 551–60. http://dx.doi.org/10.17762/msea.v70i1.2508.
Der volle Inhalt der QuelleMark Espalmado, John, und Edwin Arboleda. „DARE Algorithm: A New Security Protocol by Integration of Different Cryptographic Techniques“. International Journal of Electrical and Computer Engineering (IJECE) 7, Nr. 2 (01.04.2017): 1032. http://dx.doi.org/10.11591/ijece.v7i2.pp1032-1041.
Der volle Inhalt der QuelleFeilu Hang, Et al. „Design Of Intelligent Countermeasure System for Power System Network Security Defense“. Journal of Electrical Systems 19, Nr. 4 (25.01.2024): 227–40. http://dx.doi.org/10.52783/jes.635.
Der volle Inhalt der QuelleParthasarathy, Rajamohan, Seow Soon Loong und Preethy Ayyappan. „An Efficient Encryption Implementation Using AES Algorithm Techniques“. Journal of Engineering & Technological Advances 3, Nr. 1 (2018): 61–70. http://dx.doi.org/10.35934/segi.v3i1.61.
Der volle Inhalt der QuelleR, Mr Suresh. „A Survey on Quantum-Cryptographic Image Encryption for Secure Storage“. INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, Nr. 04 (03.04.2024): 1–5. http://dx.doi.org/10.55041/ijsrem29461.
Der volle Inhalt der QuelleSundararajan, Ananiah Durai Durai, und Rajashree R. „A Comprehensive Survey on Lightweight Asymmetric Key Cryptographic Algorithm for Resource Constrained Devices“. ECS Transactions 107, Nr. 1 (24.04.2022): 7457–68. http://dx.doi.org/10.1149/10701.7457ecst.
Der volle Inhalt der QuelleAnkita Srivastava. „Performance Evaluation of Genetic Algorithm-Driven Blockchain Encryption for EHR Management and Validation“. Journal of Electrical Systems 20, Nr. 7s (04.05.2024): 1726–39. http://dx.doi.org/10.52783/jes.3773.
Der volle Inhalt der QuelleSultan, Abid, Yao Lin und Azhar Mushtaq. „A Survey Paper on ASCII-Based Cryptographic Techniques“. Vol 4 Issue 4 4, Nr. 4 (17.12.2022): 1087–98. http://dx.doi.org/10.33411/ijist/2022040411.
Der volle Inhalt der QuelleWaheed, Adil, Fazli Subhan, Mazliham Mohd Suud, Muhammad Yasir Hayat Malik, Alina Mirza und Farkhanda Afzal. „Construction of nonlinear component of block cipher using coset graph“. AIMS Mathematics 8, Nr. 9 (2023): 21644–67. http://dx.doi.org/10.3934/math.20231104.
Der volle Inhalt der QuelleAbdElminaam, DiaaSalama, Hatem M. Abdul Kader, Mohie M. Hadhoud und Salah M. El-Sayed. „Developing and Evaluation of New Hybrid Encryption Algorithms“. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 13, Nr. 1 (28.03.2014): 4038–52. http://dx.doi.org/10.24297/ijct.v13i1.2926.
Der volle Inhalt der QuelleParenreng, Jumadi Mabe, Sahraeni Maulida Mustari und Abdul Wahid. „E-mail Security System Using El-Gamal Hybrid Algorithm and AES (Advanced Encryption Standard) Algorithm“. Internet of Things and Artificial Intelligence Journal 2, Nr. 1 (16.02.2022): 1–9. http://dx.doi.org/10.31763/iota.v2i1.510.
Der volle Inhalt der QuelleSai D, Jagadeesh, und Krishnaraj P M. „Cryptographic Interweaving of Messages“. International Journal of Data Informatics and Intelligent Computing 2, Nr. 1 (24.03.2023): 42–50. http://dx.doi.org/10.59461/ijdiic.v2i1.38.
Der volle Inhalt der QuelleLimniotis, Konstantinos. „Cryptography as the Means to Protect Fundamental Human Rights“. Cryptography 5, Nr. 4 (30.11.2021): 34. http://dx.doi.org/10.3390/cryptography5040034.
Der volle Inhalt der QuelleKumar, Dilip, und Manoj Kumar. „Hybrid Cryptographic Approach for Data Security Using Elliptic Curve Cryptography for IoT“. International Journal of Computer Network and Information Security 16, Nr. 2 (08.04.2024): 42–54. http://dx.doi.org/10.5815/ijcnis.2024.02.04.
Der volle Inhalt der QuelleGowda, V. Dankan, D. Palanikkumar, Sajja Suneel, Satish Dekka, T. Thiruvenkadam und K. D. V. Prasad. „Cryptographic image-based data security strategies in wireless sensor networks“. Journal of Discrete Mathematical Sciences and Cryptography 27, Nr. 2 (2024): 293–304. http://dx.doi.org/10.47974/jdmsc-1883.
Der volle Inhalt der QuelleShah, Aayush, Prabhat Mahato und Aadarsh Bhagat. „Enhancing Post-Quantum Cryptography: Exploring Mathematical Foundations and Comparative Analysis of Different Cryptographic Algorithm“. International Journal for Research in Applied Science and Engineering Technology 11, Nr. 8 (31.08.2023): 1626–42. http://dx.doi.org/10.22214/ijraset.2023.55341.
Der volle Inhalt der QuelleLiang, Yuheng. „A research on applications of neural network-based cryptography“. Applied and Computational Engineering 14, Nr. 1 (23.10.2023): 258–64. http://dx.doi.org/10.54254/2755-2721/14/20230798.
Der volle Inhalt der QuelleAdy Putra, Wahyu, Suyanto Suyanto und Muhammad Zarlis. „Performance Analysis Of The Combination Of Advanced Encryption Standard Cryptography Algorithms With Luc For Text Security“. SinkrOn 8, Nr. 2 (06.04.2023): 890–97. http://dx.doi.org/10.33395/sinkron.v8i2.12202.
Der volle Inhalt der QuelleAzhari, Rama, und Agita Nisa Salsabila. „Analyzing the Impact of Quantum Computing on Current Encryption Techniques“. IAIC Transactions on Sustainable Digital Innovation (ITSDI) 5, Nr. 2 (22.02.2024): 148–57. http://dx.doi.org/10.34306/itsdi.v5i2.662.
Der volle Inhalt der QuelleSubbarayudu, Yerragudipadu, Gurram Vijendar Reddy, Merugu Shankar, Mailagani Ven, P. K. Abhilash und Archana Sehgal. „Cipher Craft: Design and Analysis of Advanced Cryptographic Techniques for Secure Communication Systems“. MATEC Web of Conferences 392 (2024): 01112. http://dx.doi.org/10.1051/matecconf/202439201112.
Der volle Inhalt der QuelleL, Shammi. „Advancing Privacy and Confidentiality in the Digital Healthcare Era: The Image Encryption Solution“. International Journal of Innovative Research in Information Security 10, Nr. 04 (08.05.2024): 133–38. http://dx.doi.org/10.26562/ijiris.2024.v1004.03.
Der volle Inhalt der QuelleOukili, Soufiane, und Seddik Bri. „Hardware Implementation of AES Algorithm with Logic S-box“. Journal of Circuits, Systems and Computers 26, Nr. 09 (24.04.2017): 1750141. http://dx.doi.org/10.1142/s0218126617501419.
Der volle Inhalt der QuelleOlayah, Fekry, Mohammed Al Yami, Hamad Ali Abosaq, Yahya Ali Abdelrahman Ali, Md Ashraf Siddiqui, Reyazur Rashid Irshad, Samreen Shahwar, Asharul Islam und Rafia Sultana. „An Efficient Lightweight Crypto Security Module for Protecting Data Transmission Through IOT Based Electronic Sensors“. Journal of Nanoelectronics and Optoelectronics 19, Nr. 6 (01.06.2024): 646–57. http://dx.doi.org/10.1166/jno.2024.3609.
Der volle Inhalt der QuelleN, Swaroop KUMAR. „Encryption with DNA: The Manipulation of DNA to Deal with the Cyber Security Attacks“. ECS Transactions 107, Nr. 1 (24.04.2022): 8311–20. http://dx.doi.org/10.1149/10701.8311ecst.
Der volle Inhalt der QuelleNirmala, Endar. „Penerapan Steganografi File Gambar Menggunakan Metode Least Significant Bit (LSB) dan Algoritma Kriptografi Advanced Encryption Standard (AES) Berbasis Android“. Jurnal Informatika Universitas Pamulang 5, Nr. 1 (31.03.2020): 36. http://dx.doi.org/10.32493/informatika.v5i1.4646.
Der volle Inhalt der QuelleAhmad, Ashraf, Yousef AbuHour, Remah Younisse, Yasmeen Alslman, Eman Alnagi und Qasem Abu Al-Haija. „MID-Crypt: A Cryptographic Algorithm for Advanced Medical Images Protection“. Journal of Sensor and Actuator Networks 11, Nr. 2 (13.05.2022): 24. http://dx.doi.org/10.3390/jsan11020024.
Der volle Inhalt der QuelleGowda, V. Dankan, Pratik Gite, Mirzanur Rahman, Kirti Rahul Kadam, G. Manivasagam und K. D. V. Prasad. „Novel approaches to biometric security using enhanced session keys and elliptic curve cryptography“. Journal of Discrete Mathematical Sciences and Cryptography 27, Nr. 2 (2024): 477–88. http://dx.doi.org/10.47974/jdmsc-1884.
Der volle Inhalt der QuelleSobia Sattar. „Cryptographic Compression Techniques along with some Penetrating Attacks and Possible Security Measures“. Lahore Garrison University Research Journal of Computer Science and Information Technology 4, Nr. 2 (25.06.2020): 43–57. http://dx.doi.org/10.54692/lgurjcsit.2020.0402133.
Der volle Inhalt der QuelleChorosinski, Len, Venky Sundaram, Klaus Wolter, Richard Calatayud, Parrish Ralston, Scott Suko, David Fry und Nathanael Ellerhoff. „Supply Chain Hardware Integrity for Electronics Defense (SHIELD) Using Small “Dielets”“. International Symposium on Microelectronics 2017, Nr. 1 (01.10.2017): 000699–704. http://dx.doi.org/10.4071/isom-2017-thp21_112.
Der volle Inhalt der QuelleGosavi, Mr Abhijeet, Mr Sakib Shaikh, Mr Adnan Sayyed, Mr Somesh Sapa, Mr Ayan Shaikh und Prof A. A. Pund. „Enabling Encrypted Cloud Emails with Data Encryption using Advanced Encryption Techniques“. International Journal for Research in Applied Science and Engineering Technology 11, Nr. 6 (30.06.2023): 864–69. http://dx.doi.org/10.22214/ijraset.2023.53709.
Der volle Inhalt der QuelleBuddha, Govind Prasad. „Leveraging Cryptographic Hash Functions for Credit Card Fraud Detection“. International Journal of Recent Technology and Engineering (IJRTE) 13, Nr. 1 (30.05.2024): 16–21. http://dx.doi.org/10.35940/ijrte.f8019.13010524.
Der volle Inhalt der QuelleSaha, Ankita, Chanda Pathak und Sourav Saha. „A Study of Machine Learning Techniques in Cryptography for Cybersecurity“. American Journal of Electronics & Communication 1, Nr. 4 (07.06.2021): 22–26. http://dx.doi.org/10.15864/ajec.1404.
Der volle Inhalt der QuelleVivek Tammineedi, Venkata Satya, und V. N. Rajavarman. „A Novel Analysis of Advanced Visual Cryptography Techniques for Providing Security Against Web Attacks Using Support Vector Machine Technique“. Journal of Computational and Theoretical Nanoscience 17, Nr. 5 (01.05.2020): 2097–114. http://dx.doi.org/10.1166/jctn.2020.8855.
Der volle Inhalt der QuellePeng, Sheng, Linkai Zhu, Shanwen Hu, Zhiming Cai und Wenjian Liu. „Enhancing Global Blockchain Privacy via a Digital Mutual Trust Mechanism“. Mathematics 12, Nr. 10 (10.05.2024): 1481. http://dx.doi.org/10.3390/math12101481.
Der volle Inhalt der QuelleGobinathan, B., M. A. Mukunthan, S. Surendran, K. Somasundaram, Syed Abdul Moeed, P. Niranjan, V. Gouthami et al. „A Novel Method to Solve Real Time Security Issues in Software Industry Using Advanced Cryptographic Techniques“. Scientific Programming 2021 (28.12.2021): 1–9. http://dx.doi.org/10.1155/2021/3611182.
Der volle Inhalt der QuelleShakya, Subarna, und Sanjita Lamichhane. „Secured Crypto Stegano Data Hiding Using Least Significant Bit Substitution and Encryption“. Journal of Advanced College of Engineering and Management 2 (29.11.2016): 105. http://dx.doi.org/10.3126/jacem.v2i0.16103.
Der volle Inhalt der QuelleKumar, Boddupalli Anvesh, und V. Bapuji. „Efficient privacy preserving communication protocol for IOT applications“. Brazilian Journal of Development 10, Nr. 1 (05.01.2024): 402–19. http://dx.doi.org/10.34117/bjdv10n1-025.
Der volle Inhalt der QuelleSinaga, Nurainun Hasanah, und Muhammad Syahrizal. „Implementasi Algoritma Mars Pada Pengamanan SMS“. JURIKOM (Jurnal Riset Komputer) 7, Nr. 3 (14.06.2020): 398. http://dx.doi.org/10.30865/jurikom.v7i3.2175.
Der volle Inhalt der QuelleC.Kanmani Pappa. „Zero-Trust Cryptographic Protocols and Differential Privacy Techniques for Scalable Secure Multi-Party Computation in Big Data Analytics“. Journal of Electrical Systems 20, Nr. 5s (13.04.2024): 2114–23. http://dx.doi.org/10.52783/jes.2550.
Der volle Inhalt der Quellevan Gastel, Bernard E., Bart Jacobs und Jean Popma. „Data Protection Using Polymorphic Pseudonymisation in a Large-Scale Parkinson’s Disease Study“. Journal of Parkinson's Disease 11, s1 (16.07.2021): S19—S25. http://dx.doi.org/10.3233/jpd-202431.
Der volle Inhalt der QuelleDhiman, Oshin, und Anand Sharma. „Enhancement for Secured File Storage Using Modern Hybrid Cryptography“. International Journal on Future Revolution in Computer Science & Communication Engineering 8, Nr. 1 (31.03.2022): 01–07. http://dx.doi.org/10.17762/ijfrcsce.v8i1.2083.
Der volle Inhalt der QuelleMoldamurat, Khuralay, Yerzhan Seitkulov, Sabyrzhan Atanov, Makhabbat Bakyt und Banu Yergaliyeva. „Enhancing cryptographic protection, authentication, and authorization in cellular networks: a comprehensive research study“. International Journal of Electrical and Computer Engineering (IJECE) 14, Nr. 1 (01.02.2024): 479. http://dx.doi.org/10.11591/ijece.v14i1.pp479-487.
Der volle Inhalt der QuelleOlaniyan, Olatayo Moses, Ayobami Taiwo Olusesi, Bolaji Abigail Omodunbi, Wajeed Bolanle Wahab, Olusogo Julius Adetunji und Bamidele Musiliu Olukoya. „A Data Security Model for Mobile Ad Hoc Network Using Linear Function Mayfly Advanced Encryption Standard“. International Journal of Emerging Technology and Advanced Engineering 13, Nr. 3 (01.03.2023): 101–10. http://dx.doi.org/10.46338/ijetae0323_10.
Der volle Inhalt der QuelleAlthobaiti, Hamad, und Ahmed Adas. „Simulation of Elliptical Curve Cryptography in IPSec on Ad-Hoc Networks“. European Journal of Engineering and Formal Sciences 6, Nr. 1 (04.04.2023): 1–26. http://dx.doi.org/10.26417/687zrj13.
Der volle Inhalt der Quelle