Zeitschriftenartikel zum Thema „Symmetric encryption techniques“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Symmetric encryption techniques" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Parenreng, Jumadi Mabe, Sahraeni Maulida Mustari und Abdul Wahid. „E-mail Security System Using El-Gamal Hybrid Algorithm and AES (Advanced Encryption Standard) Algorithm“. Internet of Things and Artificial Intelligence Journal 2, Nr. 1 (16.02.2022): 1–9. http://dx.doi.org/10.31763/iota.v2i1.510.
Der volle Inhalt der QuelleMalhotra, Anoushka, Ashwin Arora und Dr Manjot Kaur Bhatia. „Symmetric Cryptographic Approaches“. International Journal for Research in Applied Science and Engineering Technology 10, Nr. 12 (31.12.2022): 718–21. http://dx.doi.org/10.22214/ijraset.2022.47982.
Der volle Inhalt der QuelleChowdhary, Chiranji Lal, Pushpam Virenbhai Patel, Krupal Jaysukhbhai Kathrotia, Muhammad Attique, Kumaresan Perumal und Muhammad Fazal Ijaz. „Analytical Study of Hybrid Techniques for Image Encryption and Decryption“. Sensors 20, Nr. 18 (10.09.2020): 5162. http://dx.doi.org/10.3390/s20185162.
Der volle Inhalt der QuelleM, Sreekala, und Varghese Paul. „A Novel Hybrid Encryption Method for Multimedia Encryption Using Elliptic Curve Cryptography and TDMRC“. International Journal of Emerging Research in Management and Technology 6, Nr. 7 (29.06.2018): 1. http://dx.doi.org/10.23956/ijermt.v6i7.178.
Der volle Inhalt der QuellePushpendra, Tiwari. „A study and comparison of the various cryptography technique standards within fifteen factors“. i-manager's Journal on Digital Forensics & Cyber Security 1, Nr. 1 (2023): 21. http://dx.doi.org/10.26634/jdf.1.1.19134.
Der volle Inhalt der QuelleKuppuswamy, Prakash, Saeed Qasim Yahya Al Khalidi Al-Maliki, Rajan John, Mohammad Haseebuddin und Ahmed Ali Shaik Meeran. „A hybrid encryption system for communication and financial transactions using RSA and a novel symmetric key algorithm“. Bulletin of Electrical Engineering and Informatics 12, Nr. 2 (01.04.2023): 1148–58. http://dx.doi.org/10.11591/eei.v12i2.4967.
Der volle Inhalt der QuelleAhamad, Md Martuza, und Md Ibrahim Abdullah. „Comparison of Encryption Algorithms for Multimedia“. Rajshahi University Journal of Science and Engineering 44 (19.11.2016): 131–39. http://dx.doi.org/10.3329/rujse.v44i0.30398.
Der volle Inhalt der QuelleZhu, Bingxin, Puwen Wei und Mingqiang Wang. „Adaptive Security of Broadcast Encryption, Revisited“. Security and Communication Networks 2017 (2017): 1–16. http://dx.doi.org/10.1155/2017/1404279.
Der volle Inhalt der QuelleParveen Sehgal, Satinder ,. „Design a Hybrid Algorithm for Data Encryption to Implementation in Database“. Tuijin Jishu/Journal of Propulsion Technology 44, Nr. 4 (16.10.2023): 1328–37. http://dx.doi.org/10.52783/tjjpt.v44.i4.1037.
Der volle Inhalt der QuelleUbaidullah, Mohammad, und Qahtan Makki. „A Review on Symmetric Key Encryption Techniques in Cryptography“. International Journal of Computer Applications 147, Nr. 10 (16.08.2016): 43–48. http://dx.doi.org/10.5120/ijca2016911203.
Der volle Inhalt der QuelleThomas, Ambili, und V. Lakshmi Narasimhan. „Symmetric and Asymmetric Encryption Algorithm Modeling on CPU Execution Time as Employed Over a Mobile Environment“. International Journal of Natural Computing Research 10, Nr. 2 (April 2021): 21–41. http://dx.doi.org/10.4018/ijncr.2021040102.
Der volle Inhalt der QuelleParthasarathy, Rajamohan, Seow Soon Loong und Preethy Ayyappan. „An Efficient Encryption Implementation Using AES Algorithm Techniques“. Journal of Engineering & Technological Advances 3, Nr. 1 (2018): 61–70. http://dx.doi.org/10.35934/segi.v3i1.61.
Der volle Inhalt der QuelleDhiman, Oshin, und Anand Sharma. „Enhancement for Secured File Storage Using Modern Hybrid Cryptography“. International Journal on Future Revolution in Computer Science & Communication Engineering 8, Nr. 1 (31.03.2022): 01–07. http://dx.doi.org/10.17762/ijfrcsce.v8i1.2083.
Der volle Inhalt der QuelleChandrakala B M, Latha A P, B. V. Shruti. „Optimizing the Application of Hybrid Cryptographic Methods for Secure File Storage and Retrieval“. Tuijin Jishu/Journal of Propulsion Technology 44, Nr. 4 (27.10.2023): 2126–33. http://dx.doi.org/10.52783/tjjpt.v44.i4.1191.
Der volle Inhalt der QuelleBenyahia, Kadda, Meftah Mustapha und Latreche Abdelkrim. „A Bio-Inspired Algorithm for Symmetric Encryption“. International Journal of Organizational and Collective Intelligence 10, Nr. 1 (Januar 2020): 1–13. http://dx.doi.org/10.4018/ijoci.2020010101.
Der volle Inhalt der QuelleAbdElminaam, DiaaSalama, Hatem M. Abdul Kader, Mohie M. Hadhoud und Salah M. El-Sayed. „Developing and Evaluation of New Hybrid Encryption Algorithms“. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 13, Nr. 1 (28.03.2014): 4038–52. http://dx.doi.org/10.24297/ijct.v13i1.2926.
Der volle Inhalt der QuelleHaryono, Wasis. „Comparison Encryption of How to Work Caesar Cipher, Hill Cipher, Blowfish and Twofish“. Data Science: Journal of Computing and Applied Informatics 4, Nr. 2 (31.07.2020): 100–110. http://dx.doi.org/10.32734/jocai.v4.i2-4004.
Der volle Inhalt der QuelleJabir, Hawraa. „An Overview of Parallel Symmetric Cipher of Messages“. JOURNAL OF UNIVERSITY OF BABYLON for Pure and Applied Sciences 31, Nr. 2 (29.06.2023): 19–33. http://dx.doi.org/10.29196/jubpas.v31i2.4652.
Der volle Inhalt der Quelle., Sonika, Sandeep Kumar Arora und Mahedi Masud. „Review on Security Based Vehicular Ad-Hoc Network“. International Journal of Engineering & Technology 7, Nr. 3.8 (07.07.2018): 125. http://dx.doi.org/10.14419/ijet.v7i3.8.16846.
Der volle Inhalt der QuelleRabie, A., Kh El Shafie, A. Hammuoda und M. Rohiem. „Data ecryption based on multi-order FrFT, and FPGA implementation of DES algorith“. International Journal of Reconfigurable and Embedded Systems (IJRES) 9, Nr. 2 (01.07.2020): 141. http://dx.doi.org/10.11591/ijres.v9.i2.pp141-152.
Der volle Inhalt der QuelleAminudin, Nur, Andino Maseleno, Shankar K, S. Hemalatha, K. Sathesh kumar, Fauzi ., Rita Irviani und Muhamad Muslihudin. „Nur Algorithm on Data Encryption and Decryption“. International Journal of Engineering & Technology 7, Nr. 2.26 (07.05.2018): 109. http://dx.doi.org/10.14419/ijet.v7i2.26.14363.
Der volle Inhalt der QuelleManiyath, Shima Ramesh, und Thanikaiselvan V. „A novel efficient multiple encryption algorithm for real time images“. International Journal of Electrical and Computer Engineering (IJECE) 10, Nr. 2 (01.04.2020): 1327. http://dx.doi.org/10.11591/ijece.v10i2.pp1327-1336.
Der volle Inhalt der QuelleTumati, Gowtham, Yalamarthi Rajesh, Manogna T und J. Ram Kumar. „A New Encryption Algorithm Using Symmetric Key Cryptography“. International Journal of Engineering & Technology 7, Nr. 2.32 (31.05.2018): 436. http://dx.doi.org/10.14419/ijet.v7i2.32.15734.
Der volle Inhalt der QuelleKuppuswamy, Prakash, und Dr Saeed Q Y Al-Khalidi. „IMPLEMENTATION OF SECURITY THROUGH SIMPLE SYMMETRIC KEY ALGORITHM BASED ON MODULO 37“. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 3, Nr. 2 (30.10.2012): 335–38. http://dx.doi.org/10.24297/ijct.v3i2c.2896.
Der volle Inhalt der QuelleHe, Wei, Yu Zhang und Yin Li. „Fast, Searchable, Symmetric Encryption Scheme Supporting Ranked Search“. Symmetry 14, Nr. 5 (18.05.2022): 1029. http://dx.doi.org/10.3390/sym14051029.
Der volle Inhalt der QuelleGui, Zichen, Kenneth G. Paterson, Sikhar Patranabis und Bogdan Warinschi. „SWiSSSE: System-Wide Security for Searchable Symmetric Encryption“. Proceedings on Privacy Enhancing Technologies 2024, Nr. 1 (Januar 2024): 549–81. http://dx.doi.org/10.56553/popets-2024-0032.
Der volle Inhalt der QuelleKour, Avleen. „Secure Authentication in Cloud Computing using Diffie Hellman and One Time Password“. International Journal for Research in Applied Science and Engineering Technology 9, Nr. VI (30.06.2021): 4375–80. http://dx.doi.org/10.22214/ijraset.2021.36037.
Der volle Inhalt der QuelleHarba, E. S. I. „Secure Data Encryption Through a Combination of AES, RSA and HMAC“. Engineering, Technology & Applied Science Research 7, Nr. 4 (09.08.2017): 1781–85. http://dx.doi.org/10.48084/etasr.1272.
Der volle Inhalt der QuelleBerisha, Artan, und Hektor Kastrati. „Parallel impelementation of RC6 algorithm“. Journal of Computer Science and Technology Studies 3, Nr. 2 (26.06.2021): 01–09. http://dx.doi.org/10.32996/jcsts.2021.3.2.1.
Der volle Inhalt der QuelleVennela, Vasireddy. „Lightweight Cryptography Algorithms for IOT Devices“. International Journal for Research in Applied Science and Engineering Technology 9, Nr. VI (20.06.2021): 1678–83. http://dx.doi.org/10.22214/ijraset.2021.35358.
Der volle Inhalt der QuelleDhakne, Dr Amol, Prasann Shimpi, Sanket Halake, Shivam Dharmshetti und Shashank Singh. „Neural Network Based Message Concealment Scheme“. International Journal for Research in Applied Science and Engineering Technology 10, Nr. 5 (31.05.2022): 1368–78. http://dx.doi.org/10.22214/ijraset.2022.42522.
Der volle Inhalt der QuelleRaja, S. P. „Multiscale transform-based secured joint efficient medical image compression-encryption using symmetric key cryptography and ebcot encoding technique“. International Journal of Wavelets, Multiresolution and Information Processing 17, Nr. 05 (September 2019): 1950034. http://dx.doi.org/10.1142/s0219691319500346.
Der volle Inhalt der QuelleVergoossen, Tom, Robert Bedington, James A. Grieve und Alexander Ling. „Satellite Quantum Communications When Man-in-the-Middle Attacks Are Excluded“. Entropy 21, Nr. 4 (10.04.2019): 387. http://dx.doi.org/10.3390/e21040387.
Der volle Inhalt der QuelleVerma, Saurav, Mahek Pokharna und Vishal Mishra. „Identifying and analyzing Risk Mitigation strategies in IOT devices using Light Weight Symmetric Encryption Algorithms“. International Journal for Research in Applied Science and Engineering Technology 10, Nr. 9 (30.09.2022): 638–46. http://dx.doi.org/10.22214/ijraset.2022.46697.
Der volle Inhalt der QuelleKaushik, Bharti, Vikas Malik und Vinod Saroha. „A Review Paper on Data Encryption and Decryption“. International Journal for Research in Applied Science and Engineering Technology 11, Nr. 4 (30.04.2023): 1986–92. http://dx.doi.org/10.22214/ijraset.2023.50101.
Der volle Inhalt der QuelleLai, Jian-Foo, und Swee-Huay Heng. „Secure File Storage On Cloud Using Hybrid Cryptography“. Journal of Informatics and Web Engineering 1, Nr. 2 (15.09.2022): 1–18. http://dx.doi.org/10.33093/jiwe.2022.1.2.1.
Der volle Inhalt der QuelleAlothman, Raya Basil, Imad Ibraheem Saada und Basma Salim Bazel Al-Brge. „A Performance-Based Comparative Encryption and Decryption Technique for Image and Video for Mobile Computing“. Journal of Cases on Information Technology 24, Nr. 2 (April 2022): 1–18. http://dx.doi.org/10.4018/jcit.20220101.oa1.
Der volle Inhalt der QuellePark, Juhyun, und Yongsu Park. „Symmetric-Key Cryptographic Routine Detection in Anti-Reverse Engineered Binaries Using Hardware Tracing“. Electronics 9, Nr. 6 (08.06.2020): 957. http://dx.doi.org/10.3390/electronics9060957.
Der volle Inhalt der QuelleBhandari, Ashok Singh. „Analysis of Computational Algebra for Cryptography and Coding Theory Applications“. Mathematical Statistician and Engineering Applications 70, Nr. 1 (31.01.2021): 598–606. http://dx.doi.org/10.17762/msea.v70i1.2513.
Der volle Inhalt der QuelleYesin, V. I., und V. V. Vilihura. „Research on the main methods and schemes of encryption with search capability“. Radiotekhnika, Nr. 209 (24.06.2022): 138–55. http://dx.doi.org/10.30837/rt.2022.2.209.14.
Der volle Inhalt der QuelleKovalchuk, A. M., Yuriy Peleckh und Tetiana Bubela. „BIT OPERATIONS WITH ELEMENTS OF THE RSA ALGORITHM IN ENCRYPTION-DECRYPTION OF COLOR IMAGES“. Measuring Equipment and Metrology 83, Nr. 3 (2022): 5–10. http://dx.doi.org/10.23939/istcmtm2022.03.005.
Der volle Inhalt der QuelleAdy Putra, Wahyu, Suyanto Suyanto und Muhammad Zarlis. „Performance Analysis Of The Combination Of Advanced Encryption Standard Cryptography Algorithms With Luc For Text Security“. SinkrOn 8, Nr. 2 (06.04.2023): 890–97. http://dx.doi.org/10.33395/sinkron.v8i2.12202.
Der volle Inhalt der QuelleSeelamanthula Sreenivasu, Et al. „DAR Model: A Novel Symmetric Key Enabled Security architecture for reliable data transfer in Wireless Sensor Networks“. International Journal on Recent and Innovation Trends in Computing and Communication 11, Nr. 10 (02.11.2023): 717–28. http://dx.doi.org/10.17762/ijritcc.v11i10.8568.
Der volle Inhalt der QuelleHanin, Charifa, Fouzia Omary, Souad Elbernoussi, Khadija Achkoun und Bouchra Echandouri. „A New Block Cipher System Using Cellular Automata and Ant Colony Optimization (BC-CaACO)“. International Journal of Information Security and Privacy 12, Nr. 4 (Oktober 2018): 54–67. http://dx.doi.org/10.4018/ijisp.2018100104.
Der volle Inhalt der QuelleAlmaiah, Mohammed Amin, Ziad Dawahdeh, Omar Almomani, Adeeb Alsaaidah, Ahmad Al-Khasawneh und Saleh Khawatreh. „A new hybrid text encryption approach over mobile ad hoc network“. International Journal of Electrical and Computer Engineering (IJECE) 10, Nr. 6 (01.12.2020): 6461. http://dx.doi.org/10.11591/ijece.v10i6.pp6461-6471.
Der volle Inhalt der QuelleJasim, Khalid F., Reem J. Ismail, Abdullah A. Nahi Al-Rabeeah und Soma Solaimanzadeh. „Analysis the Structures of Some Symmetric Cipher Algorithms Suitable for the Security of IoT Devices“. Cihan University-Erbil Scientific Journal 5, Nr. 2 (01.09.2021): 13–19. http://dx.doi.org/10.24086/cuesj.v5n2y2021.pp13-19.
Der volle Inhalt der QuelleSholikhatin, Siti Alvi, Adam Prayogo Kuncoro, Afifah Lutfia Munawaroh und Gilang Aji Setiawan. „Comparative Study of RSA Asymmetric Algorithm and AES Algorithm for Data Security“. Edu Komputika Journal 9, Nr. 1 (11.01.2023): 60–67. http://dx.doi.org/10.15294/edukomputika.v9i1.57389.
Der volle Inhalt der QuelleWang, Peng, und Xiang Li. „TEDL: A Text Encryption Method Based on Deep Learning“. Applied Sciences 11, Nr. 4 (17.02.2021): 1781. http://dx.doi.org/10.3390/app11041781.
Der volle Inhalt der QuelleM. Subhashini, K. Shankar,. „Hybrid Encryption based Access Control Approach for Securing Cloud Computing“. International Journal on Recent and Innovation Trends in Computing and Communication 11, Nr. 9 (30.10.2023): 1056–63. http://dx.doi.org/10.17762/ijritcc.v11i9.8998.
Der volle Inhalt der QuelleChatterjee, Runa, Rajdeep Chakraborty und Mondal J.K. „DESIGN OF LIGHTWEIGHT CRYPTOGRAPHIC MODEL FOR END-TO-END ENCRYPTION IN IOT DOMAIN“. IRO Journal on Sustainable Wireless Systems 1, Nr. 04 (08.12.2019): 215–24. http://dx.doi.org/10.36548/jsws.2019.4.002.
Der volle Inhalt der Quelle