Journal articles on the topic 'Advanced cryptographic techniques'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Advanced cryptographic techniques.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Abudalou, Mohammad. "Enhancing Data Security through Advanced Cryptographic Techniques." International Journal of Computer Science and Mobile Computing 13, no. 1 (January 30, 2024): 88–92. http://dx.doi.org/10.47760/ijcsmc.2024.v13i01.007.
Full textKarantjias, Athanasios, and Nineta Polemi. "Assessment of advanced cryptographic antiviral techniques." International Journal of Electronic Security and Digital Forensics 3, no. 1 (2010): 60. http://dx.doi.org/10.1504/ijesdf.2010.032331.
Full textViresh, Kasheenath Babaleshwar, Karade Sinchana, N. Sakshi, and Naidu Anush. "Audio encryption and decryption using AES algorithm technique." i-manager’s Journal on Electronics Engineering 14, no. 2 (2024): 8. http://dx.doi.org/10.26634/jele.14.2.20486.
Full textLewis, Nehama, Yaron Connelly, Gil Henkin, Max Leibovich, and Adi Akavia. "Factors Influencing the Adoption of Advanced Cryptographic Techniques for Data Protection of Patient Medical Records." Healthcare Informatics Research 28, no. 2 (April 30, 2022): 132–42. http://dx.doi.org/10.4258/hir.2022.28.2.132.
Full textHieu, Phan Duong, and Moti Yung. "PRIVACY IN ADVANCED CRYPTOGRAPHIC PROTOCOLS: PROTOTYPICAL EXAMPLES." Journal of Computer Science and Cybernetics 37, no. 4 (October 12, 2021): 429–51. http://dx.doi.org/10.15625/1813-9663/37/4/16104.
Full textMalhotra, Anoushka, Ashwin Arora, and Dr Manjot Kaur Bhatia. "Symmetric Cryptographic Approaches." International Journal for Research in Applied Science and Engineering Technology 10, no. 12 (December 31, 2022): 718–21. http://dx.doi.org/10.22214/ijraset.2022.47982.
Full textSingh, Sukhveer. "Investigation of Cryptography for Secure Communication and Data Privacy Applications." Mathematical Statistician and Engineering Applications 70, no. 1 (January 31, 2021): 551–60. http://dx.doi.org/10.17762/msea.v70i1.2508.
Full textMark Espalmado, John, and Edwin Arboleda. "DARE Algorithm: A New Security Protocol by Integration of Different Cryptographic Techniques." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 2 (April 1, 2017): 1032. http://dx.doi.org/10.11591/ijece.v7i2.pp1032-1041.
Full textFeilu Hang, Et al. "Design Of Intelligent Countermeasure System for Power System Network Security Defense." Journal of Electrical Systems 19, no. 4 (January 25, 2024): 227–40. http://dx.doi.org/10.52783/jes.635.
Full textParthasarathy, Rajamohan, Seow Soon Loong, and Preethy Ayyappan. "An Efficient Encryption Implementation Using AES Algorithm Techniques." Journal of Engineering & Technological Advances 3, no. 1 (2018): 61–70. http://dx.doi.org/10.35934/segi.v3i1.61.
Full textR, Mr Suresh. "A Survey on Quantum-Cryptographic Image Encryption for Secure Storage." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (April 3, 2024): 1–5. http://dx.doi.org/10.55041/ijsrem29461.
Full textSundararajan, Ananiah Durai Durai, and Rajashree R. "A Comprehensive Survey on Lightweight Asymmetric Key Cryptographic Algorithm for Resource Constrained Devices." ECS Transactions 107, no. 1 (April 24, 2022): 7457–68. http://dx.doi.org/10.1149/10701.7457ecst.
Full textAnkita Srivastava. "Performance Evaluation of Genetic Algorithm-Driven Blockchain Encryption for EHR Management and Validation." Journal of Electrical Systems 20, no. 7s (May 4, 2024): 1726–39. http://dx.doi.org/10.52783/jes.3773.
Full textSultan, Abid, Yao Lin, and Azhar Mushtaq. "A Survey Paper on ASCII-Based Cryptographic Techniques." Vol 4 Issue 4 4, no. 4 (December 17, 2022): 1087–98. http://dx.doi.org/10.33411/ijist/2022040411.
Full textWaheed, Adil, Fazli Subhan, Mazliham Mohd Suud, Muhammad Yasir Hayat Malik, Alina Mirza, and Farkhanda Afzal. "Construction of nonlinear component of block cipher using coset graph." AIMS Mathematics 8, no. 9 (2023): 21644–67. http://dx.doi.org/10.3934/math.20231104.
Full textAbdElminaam, DiaaSalama, Hatem M. Abdul Kader, Mohie M. Hadhoud, and Salah M. El-Sayed. "Developing and Evaluation of New Hybrid Encryption Algorithms." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 13, no. 1 (March 28, 2014): 4038–52. http://dx.doi.org/10.24297/ijct.v13i1.2926.
Full textParenreng, Jumadi Mabe, Sahraeni Maulida Mustari, and Abdul Wahid. "E-mail Security System Using El-Gamal Hybrid Algorithm and AES (Advanced Encryption Standard) Algorithm." Internet of Things and Artificial Intelligence Journal 2, no. 1 (February 16, 2022): 1–9. http://dx.doi.org/10.31763/iota.v2i1.510.
Full textSai D, Jagadeesh, and Krishnaraj P M. "Cryptographic Interweaving of Messages." International Journal of Data Informatics and Intelligent Computing 2, no. 1 (March 24, 2023): 42–50. http://dx.doi.org/10.59461/ijdiic.v2i1.38.
Full textLimniotis, Konstantinos. "Cryptography as the Means to Protect Fundamental Human Rights." Cryptography 5, no. 4 (November 30, 2021): 34. http://dx.doi.org/10.3390/cryptography5040034.
Full textKumar, Dilip, and Manoj Kumar. "Hybrid Cryptographic Approach for Data Security Using Elliptic Curve Cryptography for IoT." International Journal of Computer Network and Information Security 16, no. 2 (April 8, 2024): 42–54. http://dx.doi.org/10.5815/ijcnis.2024.02.04.
Full textGowda, V. Dankan, D. Palanikkumar, Sajja Suneel, Satish Dekka, T. Thiruvenkadam, and K. D. V. Prasad. "Cryptographic image-based data security strategies in wireless sensor networks." Journal of Discrete Mathematical Sciences and Cryptography 27, no. 2 (2024): 293–304. http://dx.doi.org/10.47974/jdmsc-1883.
Full textShah, Aayush, Prabhat Mahato, and Aadarsh Bhagat. "Enhancing Post-Quantum Cryptography: Exploring Mathematical Foundations and Comparative Analysis of Different Cryptographic Algorithm." International Journal for Research in Applied Science and Engineering Technology 11, no. 8 (August 31, 2023): 1626–42. http://dx.doi.org/10.22214/ijraset.2023.55341.
Full textLiang, Yuheng. "A research on applications of neural network-based cryptography." Applied and Computational Engineering 14, no. 1 (October 23, 2023): 258–64. http://dx.doi.org/10.54254/2755-2721/14/20230798.
Full textAdy Putra, Wahyu, Suyanto Suyanto, and Muhammad Zarlis. "Performance Analysis Of The Combination Of Advanced Encryption Standard Cryptography Algorithms With Luc For Text Security." SinkrOn 8, no. 2 (April 6, 2023): 890–97. http://dx.doi.org/10.33395/sinkron.v8i2.12202.
Full textAzhari, Rama, and Agita Nisa Salsabila. "Analyzing the Impact of Quantum Computing on Current Encryption Techniques." IAIC Transactions on Sustainable Digital Innovation (ITSDI) 5, no. 2 (February 22, 2024): 148–57. http://dx.doi.org/10.34306/itsdi.v5i2.662.
Full textSubbarayudu, Yerragudipadu, Gurram Vijendar Reddy, Merugu Shankar, Mailagani Ven, P. K. Abhilash, and Archana Sehgal. "Cipher Craft: Design and Analysis of Advanced Cryptographic Techniques for Secure Communication Systems." MATEC Web of Conferences 392 (2024): 01112. http://dx.doi.org/10.1051/matecconf/202439201112.
Full textL, Shammi. "Advancing Privacy and Confidentiality in the Digital Healthcare Era: The Image Encryption Solution." International Journal of Innovative Research in Information Security 10, no. 04 (May 8, 2024): 133–38. http://dx.doi.org/10.26562/ijiris.2024.v1004.03.
Full textOukili, Soufiane, and Seddik Bri. "Hardware Implementation of AES Algorithm with Logic S-box." Journal of Circuits, Systems and Computers 26, no. 09 (April 24, 2017): 1750141. http://dx.doi.org/10.1142/s0218126617501419.
Full textOlayah, Fekry, Mohammed Al Yami, Hamad Ali Abosaq, Yahya Ali Abdelrahman Ali, Md Ashraf Siddiqui, Reyazur Rashid Irshad, Samreen Shahwar, Asharul Islam, and Rafia Sultana. "An Efficient Lightweight Crypto Security Module for Protecting Data Transmission Through IOT Based Electronic Sensors." Journal of Nanoelectronics and Optoelectronics 19, no. 6 (June 1, 2024): 646–57. http://dx.doi.org/10.1166/jno.2024.3609.
Full textN, Swaroop KUMAR. "Encryption with DNA: The Manipulation of DNA to Deal with the Cyber Security Attacks." ECS Transactions 107, no. 1 (April 24, 2022): 8311–20. http://dx.doi.org/10.1149/10701.8311ecst.
Full textNirmala, Endar. "Penerapan Steganografi File Gambar Menggunakan Metode Least Significant Bit (LSB) dan Algoritma Kriptografi Advanced Encryption Standard (AES) Berbasis Android." Jurnal Informatika Universitas Pamulang 5, no. 1 (March 31, 2020): 36. http://dx.doi.org/10.32493/informatika.v5i1.4646.
Full textAhmad, Ashraf, Yousef AbuHour, Remah Younisse, Yasmeen Alslman, Eman Alnagi, and Qasem Abu Al-Haija. "MID-Crypt: A Cryptographic Algorithm for Advanced Medical Images Protection." Journal of Sensor and Actuator Networks 11, no. 2 (May 13, 2022): 24. http://dx.doi.org/10.3390/jsan11020024.
Full textGowda, V. Dankan, Pratik Gite, Mirzanur Rahman, Kirti Rahul Kadam, G. Manivasagam, and K. D. V. Prasad. "Novel approaches to biometric security using enhanced session keys and elliptic curve cryptography." Journal of Discrete Mathematical Sciences and Cryptography 27, no. 2 (2024): 477–88. http://dx.doi.org/10.47974/jdmsc-1884.
Full textSobia Sattar. "Cryptographic Compression Techniques along with some Penetrating Attacks and Possible Security Measures." Lahore Garrison University Research Journal of Computer Science and Information Technology 4, no. 2 (June 25, 2020): 43–57. http://dx.doi.org/10.54692/lgurjcsit.2020.0402133.
Full textChorosinski, Len, Venky Sundaram, Klaus Wolter, Richard Calatayud, Parrish Ralston, Scott Suko, David Fry, and Nathanael Ellerhoff. "Supply Chain Hardware Integrity for Electronics Defense (SHIELD) Using Small “Dielets”." International Symposium on Microelectronics 2017, no. 1 (October 1, 2017): 000699–704. http://dx.doi.org/10.4071/isom-2017-thp21_112.
Full textGosavi, Mr Abhijeet, Mr Sakib Shaikh, Mr Adnan Sayyed, Mr Somesh Sapa, Mr Ayan Shaikh, and Prof A. A. Pund. "Enabling Encrypted Cloud Emails with Data Encryption using Advanced Encryption Techniques." International Journal for Research in Applied Science and Engineering Technology 11, no. 6 (June 30, 2023): 864–69. http://dx.doi.org/10.22214/ijraset.2023.53709.
Full textBuddha, Govind Prasad. "Leveraging Cryptographic Hash Functions for Credit Card Fraud Detection." International Journal of Recent Technology and Engineering (IJRTE) 13, no. 1 (May 30, 2024): 16–21. http://dx.doi.org/10.35940/ijrte.f8019.13010524.
Full textSaha, Ankita, Chanda Pathak, and Sourav Saha. "A Study of Machine Learning Techniques in Cryptography for Cybersecurity." American Journal of Electronics & Communication 1, no. 4 (June 7, 2021): 22–26. http://dx.doi.org/10.15864/ajec.1404.
Full textVivek Tammineedi, Venkata Satya, and V. N. Rajavarman. "A Novel Analysis of Advanced Visual Cryptography Techniques for Providing Security Against Web Attacks Using Support Vector Machine Technique." Journal of Computational and Theoretical Nanoscience 17, no. 5 (May 1, 2020): 2097–114. http://dx.doi.org/10.1166/jctn.2020.8855.
Full textPeng, Sheng, Linkai Zhu, Shanwen Hu, Zhiming Cai, and Wenjian Liu. "Enhancing Global Blockchain Privacy via a Digital Mutual Trust Mechanism." Mathematics 12, no. 10 (May 10, 2024): 1481. http://dx.doi.org/10.3390/math12101481.
Full textGobinathan, B., M. A. Mukunthan, S. Surendran, K. Somasundaram, Syed Abdul Moeed, P. Niranjan, V. Gouthami, et al. "A Novel Method to Solve Real Time Security Issues in Software Industry Using Advanced Cryptographic Techniques." Scientific Programming 2021 (December 28, 2021): 1–9. http://dx.doi.org/10.1155/2021/3611182.
Full textShakya, Subarna, and Sanjita Lamichhane. "Secured Crypto Stegano Data Hiding Using Least Significant Bit Substitution and Encryption." Journal of Advanced College of Engineering and Management 2 (November 29, 2016): 105. http://dx.doi.org/10.3126/jacem.v2i0.16103.
Full textKumar, Boddupalli Anvesh, and V. Bapuji. "Efficient privacy preserving communication protocol for IOT applications." Brazilian Journal of Development 10, no. 1 (January 5, 2024): 402–19. http://dx.doi.org/10.34117/bjdv10n1-025.
Full textSinaga, Nurainun Hasanah, and Muhammad Syahrizal. "Implementasi Algoritma Mars Pada Pengamanan SMS." JURIKOM (Jurnal Riset Komputer) 7, no. 3 (June 14, 2020): 398. http://dx.doi.org/10.30865/jurikom.v7i3.2175.
Full textC.Kanmani Pappa. "Zero-Trust Cryptographic Protocols and Differential Privacy Techniques for Scalable Secure Multi-Party Computation in Big Data Analytics." Journal of Electrical Systems 20, no. 5s (April 13, 2024): 2114–23. http://dx.doi.org/10.52783/jes.2550.
Full textvan Gastel, Bernard E., Bart Jacobs, and Jean Popma. "Data Protection Using Polymorphic Pseudonymisation in a Large-Scale Parkinson’s Disease Study." Journal of Parkinson's Disease 11, s1 (July 16, 2021): S19—S25. http://dx.doi.org/10.3233/jpd-202431.
Full textDhiman, Oshin, and Anand Sharma. "Enhancement for Secured File Storage Using Modern Hybrid Cryptography." International Journal on Future Revolution in Computer Science & Communication Engineering 8, no. 1 (March 31, 2022): 01–07. http://dx.doi.org/10.17762/ijfrcsce.v8i1.2083.
Full textMoldamurat, Khuralay, Yerzhan Seitkulov, Sabyrzhan Atanov, Makhabbat Bakyt, and Banu Yergaliyeva. "Enhancing cryptographic protection, authentication, and authorization in cellular networks: a comprehensive research study." International Journal of Electrical and Computer Engineering (IJECE) 14, no. 1 (February 1, 2024): 479. http://dx.doi.org/10.11591/ijece.v14i1.pp479-487.
Full textOlaniyan, Olatayo Moses, Ayobami Taiwo Olusesi, Bolaji Abigail Omodunbi, Wajeed Bolanle Wahab, Olusogo Julius Adetunji, and Bamidele Musiliu Olukoya. "A Data Security Model for Mobile Ad Hoc Network Using Linear Function Mayfly Advanced Encryption Standard." International Journal of Emerging Technology and Advanced Engineering 13, no. 3 (March 1, 2023): 101–10. http://dx.doi.org/10.46338/ijetae0323_10.
Full textAlthobaiti, Hamad, and Ahmed Adas. "Simulation of Elliptical Curve Cryptography in IPSec on Ad-Hoc Networks." European Journal of Engineering and Formal Sciences 6, no. 1 (April 4, 2023): 1–26. http://dx.doi.org/10.26417/687zrj13.
Full text