Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Encryption techniques“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Encryption techniques" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Encryption techniques"
Et. al., Jaichandran R,. „A Hybrid Encryption Model with Attribute Based Encryption and Advanced Encryption Standard Techniques“. Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, Nr. 2 (11.04.2021): 334–36. http://dx.doi.org/10.17762/turcomat.v12i2.720.
Der volle Inhalt der QuelleRamanathan, Thirumalaimuthu, Md Jakir Hossen, Md Shohel Sayeed und Joseph Emerson Raja. „Survey on computational intelligence based image encryption techniques“. Indonesian Journal of Electrical Engineering and Computer Science 19, Nr. 3 (01.09.2020): 1428. http://dx.doi.org/10.11591/ijeecs.v19.i3.pp1428-1435.
Der volle Inhalt der QuelleParenreng, Jumadi Mabe, Sahraeni Maulida Mustari und Abdul Wahid. „E-mail Security System Using El-Gamal Hybrid Algorithm and AES (Advanced Encryption Standard) Algorithm“. Internet of Things and Artificial Intelligence Journal 2, Nr. 1 (16.02.2022): 1–9. http://dx.doi.org/10.31763/iota.v2i1.510.
Der volle Inhalt der QuelleSharma, Ramandeep, Richa Sharma und Harmanjit Singh. „Classical Encryption Techniques“. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 3, Nr. 1 (01.08.2012): 84–90. http://dx.doi.org/10.24297/ijct.v3i1b.2745.
Der volle Inhalt der QuelleYeow, Sin-Qian, und Kok-Why Ng. „Neural Network Based Data Encryption: A Comparison Study among DES, AES, and HE Techniques“. JOIV : International Journal on Informatics Visualization 7, Nr. 3-2 (30.11.2023): 2086. http://dx.doi.org/10.30630/joiv.7.3-2.2336.
Der volle Inhalt der QuelleLi, Bingcheng, Dingkang Li und Mingyuan Zhu. „Application analysis of data encryption technology“. Applied and Computational Engineering 50, Nr. 1 (25.03.2024): 199–205. http://dx.doi.org/10.54254/2755-2721/50/20241502.
Der volle Inhalt der QuelleThabit, Zainab Hasan, Sadiq A. Mehdi und Bashar M. Nema. „Enhancing Color Image Security: Encryption with Dynamic Chaotic Three-Dimensional System and Robust Security Analysis“. Al-Mustansiriyah Journal of Science 34, Nr. 4 (30.12.2023): 87–95. http://dx.doi.org/10.23851/mjs.v34i4.1411.
Der volle Inhalt der QuelleYang, Ming, Monica Trifas, Guillermo Francia III und Lei Chen. „Cryptographic and Steganographic Approaches to Ensure Multimedia Information Security and Privacy“. International Journal of Information Security and Privacy 3, Nr. 3 (Juli 2009): 37–54. http://dx.doi.org/10.4018/jisp.2009100703.
Der volle Inhalt der QuelleAlslman, Yasmeen, Eman Alnagi, Ashraf Ahmad, Yousef AbuHour, Remah Younisse und Qasem Abu Al-haija. „Hybrid Encryption Scheme for Medical Imaging Using AutoEncoder and Advanced Encryption Standard“. Electronics 11, Nr. 23 (30.11.2022): 3967. http://dx.doi.org/10.3390/electronics11233967.
Der volle Inhalt der QuelleMohammed, Zahraa A., Hadeel Qasem Gheni, Zahraa Jabbar Hussein und Ali Kadhum M. Al-Qurabat. „Advancing Cloud Image Security via AES Algorithm Enhancement Techniques“. Engineering, Technology & Applied Science Research 14, Nr. 1 (08.02.2024): 12694–701. http://dx.doi.org/10.48084/etasr.6601.
Der volle Inhalt der QuelleDissertationen zum Thema "Encryption techniques"
Wang, Yongsheng. „Advanced video encryption techniques“. Thesis, Queen's University Belfast, 2013. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.602966.
Der volle Inhalt der QuelleDutta, Saurabh. „Approach towards development of efficient encryption techniques“. Thesis, University of North Bengal, 2004. http://hdl.handle.net/123456789/26.
Der volle Inhalt der QuelleKasarabada, Yasaswy V. „Efficient Logic Encryption Techniques for Sequential Circuits“. University of Cincinnati / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1613752483402656.
Der volle Inhalt der QuelleTalhah, Saad. „Advanced Encryption Techniques using New Mersenne Number Transforms“. Thesis, University of Leeds, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.515408.
Der volle Inhalt der QuelleChen, Hang. „Optical Encryption Techniques for Color Image and Hyperspectral Data“. Thesis, Université de Lorraine, 2017. http://www.theses.fr/2017LORR0374.
Der volle Inhalt der QuelleOptical information security is one of the most important research directions in information science and technology, especially in the field of copyright protection, confidential information transmission/storage and military remote sensing. Since double random phase encoding technology (DRPE) was proposed, optical image encryption technology has become the main topic of optical information security and it has been developed and studied deeply. Optical encryption techniques offer the possibility of high-speed parallel processing of two dimension image data and hiding information in many different dimensions. In this context, much significant research and investigation on optical image encryption have been presented based on DRPE or further optical operation, such as digital holography, Fresnel transform, gyrator transform. Simultaneously, the encrypted image has been extended from single gray image to double image, color image and multi-image. However, the hyperspectral image, as a significant element in military and commercial remote sensing, has not been deeply researched in optical encryption area until now. This work extends the optical encryption technology from color image to hyperspectral image. For better comprehension of hyperspectral image encryption, this work begins with the introduction and analysis of the characteristics of hyperspectral cube. Subsequently, several kinds of encryption schemes for color image, including symmetric and asymmetric cryptosystem, are presented individually. Furthermore, the optical encryption algorithms for hyperspectral cube are designed for securing both the spatial and spectral information simultaneously. Some numerical simulations are given to validate the performance of the proposed encryption schemes. The corresponding attack experiment results demonstrate the capability and robustness of the approaches designed in this work. The research in this dissertation provides reference for the further practicality of hyperspectral image encryption
Jha, Pawan Kumar. „AN APPROACH TOWARDS DESIGN AND IMPLEMENTATION OF SYMMETRIC ENCRYPTION TECHNIQUES“. Thesis, University of North Bengal, 2006. http://hdl.handle.net/123456789/11.
Der volle Inhalt der QuelleWong, Hon Wah. „Image watermarking and data hiding techniques /“. View Abstract or Full-Text, 2003. http://library.ust.hk/cgi/db/thesis.pl?ELEC%202003%20WONGH.
Der volle Inhalt der QuelleIncludes bibliographical references (leaves 163-178). Also available in electronic version. Access restricted to campus users.
Brisbane, Gareth Charles Beattie. „On information hiding techniques for digital images“. Access electronically, 2004. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20050221.122028/index.html.
Der volle Inhalt der QuelleGuruswamy, Aarumugam Bhupathi Rajan. „Independent Domain of Symmetric Encryption using Least SignificantBit : Computer Vision, Steganography and Cryptography Techniques“. Thesis, Högskolan Dalarna, Datateknik, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:du-10063.
Der volle Inhalt der QuelleZhao, Weiliang, University of Western Sydney, of Science Technology and Environment College und School of Computing and Information Technology. „Security techniques for electronic commerce applications“. THESIS_CSTE_CIT_Zhao_W.xml, 2003. http://handle.uws.edu.au:8081/1959.7/127.
Der volle Inhalt der QuelleMaster of Science (Hons)
Bücher zum Thema "Encryption techniques"
Held, Gilbert. Top secret data encryption techniques. Carmel, Ind: Sams Pub., 1993.
Den vollen Inhalt der Quelle findenLian, Shiguo. Multimedia content encryption: Techniques and applications. Boca Raton: Auerbach Publications, 2008.
Den vollen Inhalt der Quelle findenBorivoje, Furht, und Kirovski Darko, Hrsg. Multimedia encryption and authentication techniques and applications. Boca Raton, Fla: Auerbach Publications, 2006.
Den vollen Inhalt der Quelle findenHeld, Gilbert. Learn encryption techniques with BASIC and C++. Plano, Tex: Wordware Pub., 1999.
Den vollen Inhalt der Quelle findenGriffiths, James. Investigate, code and compare techniques used in implementing encryption technology. Oxford: Oxford Brookes University, 2003.
Den vollen Inhalt der Quelle findenSwenson, Christopher. Modern cryptanalysis: Techniques for advanced code breaking. Indianapolis, IN: Wiley Pub., 2008.
Den vollen Inhalt der Quelle findenS, Schmalz Mark, Society of Photo-optical Instrumentation Engineers. und Society for Industrial and Applied Mathematics., Hrsg. Mathematics and applications of data/image coding, compression, and encryption III: 2 August 2000, San Diego, USA. Bellingham, Wash., USA: SPIE, 2000.
Den vollen Inhalt der Quelle findenS, Schmalz Mark, und Society of Photo-optical Instrumentation Engineers., Hrsg. Mathematics of data/image coding, compression, and encryption VII, with applications: 4-5 August, 2004, Denver, Colorado, USA. Bellingham, Wash: SPIE, 2004.
Den vollen Inhalt der Quelle findenShih, Frank Y. Digital watermarking and steganography: Fundamentals and techniques. Boca Raton, Fl: Taylor & Francis, 2008.
Den vollen Inhalt der Quelle findenWold, Geoffrey H. Computer crime: Techniques, prevention. Rolling Meadows, Ill: Bankers Pub. Co., 1989.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Encryption techniques"
Albrecht, Martin, und Carlos Cid. „Algebraic Techniques in Differential Cryptanalysis“. In Fast Software Encryption, 193–208. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03317-9_12.
Der volle Inhalt der QuelleGautam, Tanvi. „Identity—Based Encryption“. In Emerging Security Algorithms and Techniques, herausgegeben von Aditya Thakkar und Nitish Pathak, 159–81. Boca Raton : Taylor & Francis, a CRC title, part of the Taylor &: Chapman and Hall/CRC, 2019. http://dx.doi.org/10.1201/9781351021708-10.
Der volle Inhalt der QuelleGautam, Tanvi, Aditya Thakkar und Nitish Pathak. „Attribute-Based Encryption“. In Emerging Security Algorithms and Techniques, 183–95. Boca Raton : Taylor & Francis, a CRC title, part of the Taylor &: Chapman and Hall/CRC, 2019. http://dx.doi.org/10.1201/9781351021708-11.
Der volle Inhalt der QuelleGouget, Aline, Hervé Sibert, Côme Berbain, Nicolas Courtois, Blandine Debraize und Chris Mitchell. „Analysis of the Bit-Search Generator and Sequence Compression Techniques“. In Fast Software Encryption, 196–214. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11502760_13.
Der volle Inhalt der QuelleThanki, Rohit M. „Audio Watermarking with Encryption“. In Advanced Techniques for Audio Watermarking, 59–81. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-24186-5_5.
Der volle Inhalt der QuelleDinur, Itai, Orr Dunkelman, Nathan Keller und Adi Shamir. „Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64“. In Fast Software Encryption, 390–410. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-46706-0_20.
Der volle Inhalt der QuelleLu, Rongxing. „Homomorphic Public Key Encryption Techniques“. In Wireless Networks, 13–40. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-32899-7_2.
Der volle Inhalt der QuelleRajendiran, M., B. Syed Ibrahim, R. Pratheesh und C. Nelson Kennnedy Babu. „Multilanguage Based SMS Encryption Techniques“. In Advances in Intelligent Systems and Computing, 455–60. New Delhi: Springer India, 2013. http://dx.doi.org/10.1007/978-81-322-0740-5_55.
Der volle Inhalt der QuelleMishra, Prasanna Raghaw, Indivar Gupta und Navneet Gaba. „Cryptanalysis of Multilanguage Encryption Techniques“. In Mathematics and Computing 2013, 13–21. New Delhi: Springer India, 2014. http://dx.doi.org/10.1007/978-81-322-1952-1_2.
Der volle Inhalt der QuelleChen, Huaifeng, und Xiaoyun Wang. „Improved Linear Hull Attack on Round-Reduced Simon with Dynamic Key-Guessing Techniques“. In Fast Software Encryption, 428–49. Berlin, Heidelberg: Springer Berlin Heidelberg, 2016. http://dx.doi.org/10.1007/978-3-662-52993-5_22.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Encryption techniques"
Liu Nan, Wang Huifen und Fan Jing. „Time hopping encryption techniques“. In IET 2nd International Conference on Wireless, Mobile and Multimedia Networks (ICWMMN 2008). IEE, 2008. http://dx.doi.org/10.1049/cp:20081040.
Der volle Inhalt der QuelleMalladar, Rohit, und Sanjeev Kunte. „Selective video encryption using Sattolo's encryption technique“. In 2016 International Conference on Electrical, Electronics, Communication, Computer and Optimization Techniques (ICEECCOT). IEEE, 2016. http://dx.doi.org/10.1109/iceeccot.2016.7955228.
Der volle Inhalt der QuelleShafiq, Sobia, Sundas Hanif, Fasih Ur Rehman, Kamran Tariq und Adeel Nawaz. „Video Encryption Techniques: A Review“. In 2019 International Conference on Digitization (ICD). IEEE, 2019. http://dx.doi.org/10.1109/icd47981.2019.9105707.
Der volle Inhalt der QuelleKoganti, Venkata SreeKrishna, Lavanya K. Galla, Nagarjuna Nuthalapati und Anil Varma Kakarlapudi. „Authentication protocols using encryption techniques“. In 2016 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT). IEEE, 2016. http://dx.doi.org/10.1109/iccicct.2016.7987921.
Der volle Inhalt der QuelleShunmugan, S., und P. Arockia Jansi Rani. „Encryption-then-compression techniques: A survey“. In 2016 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT). IEEE, 2016. http://dx.doi.org/10.1109/iccicct.2016.7988037.
Der volle Inhalt der QuelleDivanshu, Hitu Singla, Vikash Sharma, Bharti Sharma und Prateek Thakral. „A Quick Tour to Encryption Techniques“. In 2018 2nd International Conference on Trends in Electronics and Informatics (ICOEI). IEEE, 2018. http://dx.doi.org/10.1109/icoei.2018.8553758.
Der volle Inhalt der QuelleSingh, Kehar. „Optical encryption techniques for data security“. In 19th Congress of the International Commission for Optics: Optics for the Quality of Life, herausgegeben von Giancarlo C. Righini und Anna Consortini. SPIE, 2003. http://dx.doi.org/10.1117/12.524636.
Der volle Inhalt der QuelleOgiela, Marek R., und Marcin Oczko. „Comparison of Selected Homomorphic Encryption Techniques“. In 2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA). IEEE, 2018. http://dx.doi.org/10.1109/aina.2018.00159.
Der volle Inhalt der QuelleWeir, M. „6.1 Encryption Techniques for Test Data“. In ettc2022 - European Test and Telemetry Conference. AMA Service GmbH, Von-Münchhausen-Str. 49, 31515 Wunstorf, Germany, 2022. http://dx.doi.org/10.5162/ettc2022/6.1.
Der volle Inhalt der QuelleShyamala, N., und K. Anusudha. „Reversible Chaotic Encryption Techniques For Images“. In 2017 Fourth International Conference on Signal Processing,Communication and Networking (ICSCN). IEEE, 2017. http://dx.doi.org/10.1109/icscn.2017.8085656.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Encryption techniques"
Rannenberg, Kai, Sebastian Pape, Frédéric Tronnier und Sascha Löbner. Study on the Technical Evaluation of De-Identification Procedures for Personal Data in the Automotive Sector. Universitätsbibliothek Johann Christian Senckenberg, Oktober 2021. http://dx.doi.org/10.21248/gups.63413.
Der volle Inhalt der Quelle