Journal articles on the topic 'Asymmetric encryption methods'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Asymmetric encryption methods.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Luo, Guangchun, Ningduo Peng, Ke Qin, and Aiguo Chen. "A Layered Searchable Encryption Scheme with Functional Components Independent of Encryption Methods." Scientific World Journal 2014 (2014): 1–16. http://dx.doi.org/10.1155/2014/153791.
Full textAbdElminaam, DiaaSalama, Hatem M. Abdul Kader, Mohie M. Hadhoud, and Salah M. El-Sayed. "Developing and Evaluation of New Hybrid Encryption Algorithms." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 13, no. 1 (March 28, 2014): 4038–52. http://dx.doi.org/10.24297/ijct.v13i1.2926.
Full textYayla, Rıdvan, Hakan Üçgün, and Sefa Tunçer. "A Research on Encryption Methods and Account Security." Academic Perspective Procedia 3, no. 1 (October 25, 2020): 385–94. http://dx.doi.org/10.33793/acperpro.03.01.81.
Full textNagavalli, S., and G. Ramachandran. "A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryption Scheme." International Journal of Advances in Applied Sciences 7, no. 4 (December 1, 2018): 369. http://dx.doi.org/10.11591/ijaas.v7.i4.pp369-376.
Full textSa'adah, Nihayatus, I. Gede Puja Astawa, and Amang Sudarsono. "Trusted Data Transmission Using Data Scrambling Security Method with Asymmetric Key Algorithm for Synchronization." EMITTER International Journal of Engineering Technology 6, no. 2 (December 29, 2018): 217–35. http://dx.doi.org/10.24003/emitter.v6i2.267.
Full textHOOBI, Mays M. "SURVEY: EFFICIENT HYBRID ALGOR ITHMS OF CRYPTOGRAPHY." MINAR International Journal of Applied Sciences and Technology 2, no. 4 (December 1, 2020): 1–16. http://dx.doi.org/10.47832/2717-8234.4-2.1.
Full textManiyath, Shima Ramesh, and Thanikaiselvan V. "A novel efficient multiple encryption algorithm for real time images." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 2 (April 1, 2020): 1327. http://dx.doi.org/10.11591/ijece.v10i2.pp1327-1336.
Full textZhu, Maoran, and Xin Liu. "Study on Internet Finance Credit Information Sharing Based on Block Chain Technology." Asian Social Science 14, no. 2 (January 29, 2018): 81. http://dx.doi.org/10.5539/ass.v14n2p81.
Full textSafira, Maria Okta, and I. Komang Ari Mogi. "Design Of Hybrid Cryptography With Vigenere Cipher And RSA Algorithm On IOT Data Security." JELIKU (Jurnal Elektronik Ilmu Komputer Udayana) 8, no. 4 (February 4, 2020): 475. http://dx.doi.org/10.24843/jlk.2020.v08.i04.p14.
Full textKotukh, E. V., O. V. Severinov, A. V. Vlasov, L. S. Kozina, A. O. Tenytska, and E. O. Zarudna. "Methods of construction and properties of logariphmic signatures." Radiotekhnika, no. 205 (July 2, 2021): 94–99. http://dx.doi.org/10.30837/rt.2021.2.205.09.
Full textLaurentinus, Laurentinus, Harrizki Arie Pradana, Dwi Yuny Sylfania, and Fransiskus Panca Juniawan. "Performance comparison of RSA and AES to SMS messages compression using Huffman algorithm." Jurnal Teknologi dan Sistem Komputer 8, no. 3 (April 19, 2020): 171–77. http://dx.doi.org/10.14710/jtsiskom.2020.13468.
Full textKlimushyn, Petro, Tetiana Solianyk, Oleksandr Mozhaev, Vitalii Nosov, Tetiana Kolisnyk, and Vasily Yanov. "HARDWARE SUPPORT PROCEDURES FOR ASYMMETRIC AUTHENTICATION OF THE INTERNET OF THINGS." Innovative Technologies and Scientific Solutions for Industries, no. 4 (18) (December 10, 2021): 31–39. http://dx.doi.org/10.30837/itssi.2021.18.031.
Full textSingh, Hukum, and Mehak Khurana. "An Asymmetric Optical Cryptosystem of Double Image Encryption Based on Optical Vortex Phase Mask Using Gyrator Transform Domain." Recent Advances in Computer Science and Communications 13, no. 4 (October 19, 2020): 672–85. http://dx.doi.org/10.2174/1385272823666190429155557.
Full textHarba, E. S. I. "Secure Data Encryption Through a Combination of AES, RSA and HMAC." Engineering, Technology & Applied Science Research 7, no. 4 (August 9, 2017): 1781–85. http://dx.doi.org/10.48084/etasr.1272.
Full textKorolyov, V., M. Ogurtsov, and A. Khodzinsky. "Multilevel Identification Friend or Foe of Objects and Analysis of the Applicability of Post-Quantum Cryptographic Algorithms for Information Security." Cybernetics and Computer Technologies, no. 3 (October 27, 2020): 74–84. http://dx.doi.org/10.34229/2707-451x.20.3.7.
Full textRohan, Dewanto Harwin, and Nur Hayati. "Persamaan Lorenz untuk Keamanan Nomor Serial Sistem Operasi Window7." Jurnal Ilmiah FIFO 10, no. 2 (March 1, 2019): 1. http://dx.doi.org/10.22441/fifo.2018.v10i2.001.
Full textHongmei, Zhao. "A Cross-Border E-Commerce Approach Based on Blockchain Technology." Mobile Information Systems 2021 (July 15, 2021): 1–10. http://dx.doi.org/10.1155/2021/2006082.
Full textLi, Xin Hua. "Research of JMS Security Mechanism." Applied Mechanics and Materials 635-637 (September 2014): 1171–74. http://dx.doi.org/10.4028/www.scientific.net/amm.635-637.1171.
Full textBudati, Anil Kumar, Ganesh Snv, Kumar Cherukupalli, Anil Kumar P., and Venkata Krishna Moorthy T. "High speed data encryption technique with optimized memory based RSA algorithm for communications." Circuit World 47, no. 3 (June 22, 2021): 269–73. http://dx.doi.org/10.1108/cw-10-2020-0282.
Full textKulibaba, V. A. "Processes and methods for selecting system-wide parameters and analysis of resistance against third-party channel attacks for the key encapsulation mechanism DSTU 8961:2019." Radiotekhnika, no. 205 (July 2, 2021): 71–78. http://dx.doi.org/10.30837/rt.2021.2.205.06.
Full textSihombing, Grace Lamudur Arta. "HYBRID CHRIPTOGRAPHY STREAM CIPHER AND RSA ALGORITHM WITH DIGITAL SIGNATURE AS A KEY." InfoTekJar (Jurnal Nasional Informatika dan Teknologi Jaringan) 1, no. 2 (March 6, 2017): 75–83. http://dx.doi.org/10.30743/infotekjar.v1i2.66.
Full textVarma, Richa, Chris Melville, Claudio Pinello, and Tuhin Sahai. "Post Quantum Secure Command and Control of Mobile Agents Inserting Quantum-Resistant Encryption Schemes in the Secure Robot Operating System." International Journal of Semantic Computing 15, no. 03 (September 2021): 359–79. http://dx.doi.org/10.1142/s1793351x21400092.
Full textEt. al., Rojasree V. "Research Intuitions of Asymmetric Crypto System." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 3 (April 11, 2021): 5024–33. http://dx.doi.org/10.17762/turcomat.v12i3.2016.
Full textVamsi, Desam, and Pradeep Reddy CH. "Hybrid Image Encryption Using Elliptic Curve Cryptography, Hadamard Transform and Hill Cipher." Webology 19, no. 1 (January 20, 2022): 2357–78. http://dx.doi.org/10.14704/web/v19i1/web19160.
Full textAmir, Zainal, Syaifuddin Syaifuddin, and Diah Risqiwati. "IMPLEMENTASI ASYMMETRIC ENCRYPTION RSA PADA PORT KNOCKING UBUNTU SERVER MENGGUNAKAN KNOCKD DAN PYTHON." Jurnal Repositor 2, no. 6 (April 14, 2020): 787. http://dx.doi.org/10.22219/repositor.v2i6.270.
Full textWang, Ziheng, Heng Chen, and Weiguo Wu. "Client-Aware Negotiation for Secure and Efficient Data Transmission." Energies 13, no. 21 (November 4, 2020): 5777. http://dx.doi.org/10.3390/en13215777.
Full textSravani, B., Dr S. Pradeep, A. Damodar, and K. Kumar Swamy. "Compact Spiral Asymmetric encryption Distributed Ledger –Secured and authentication Mobile Payment System in Higher Institutions." Journal of University of Shanghai for Science and Technology 23, no. 08 (August 17, 2021): 567–82. http://dx.doi.org/10.51201/jusst/21/08427.
Full textYadav, Manisha, Karan Singh, Ajay Shekhar Pandey, Adesh Kumar, and Rajeev Kumar. "Smart Communication and Security by Key Distribution in Multicast Environment." Wireless Communications and Mobile Computing 2022 (March 19, 2022): 1–14. http://dx.doi.org/10.1155/2022/1011407.
Full textAlmaiah, Mohammed Amin, Ziad Dawahdeh, Omar Almomani, Adeeb Alsaaidah, Ahmad Al-Khasawneh, and Saleh Khawatreh. "A new hybrid text encryption approach over mobile ad hoc network." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 6 (December 1, 2020): 6461. http://dx.doi.org/10.11591/ijece.v10i6.pp6461-6471.
Full textFălămaş, Diana-Elena, Kinga Marton, and Alin Suciu. "Assessment of Two Privacy Preserving Authentication Methods Using Secure Multiparty Computation Based on Secret Sharing." Symmetry 13, no. 5 (May 18, 2021): 894. http://dx.doi.org/10.3390/sym13050894.
Full textFassa, M., G. Coatrieux, G. Trouessin, F. A. Allaert, and C. Quantin. "Combining Hashing and Enciphering Algorithms for Epidemiological Analysis of Gathered Data." Methods of Information in Medicine 47, no. 05 (2008): 454–58. http://dx.doi.org/10.3414/me0546.
Full textHumdullah, Salman, Siti Hajar Othman, Muhammad Najib Razali, Hazinah Kutty Mammi, and Rabia Javed. "An Improved Blockchain Technique for Secure Land Registration Data Records." International Journal of Innovative Computing 11, no. 2 (October 31, 2021): 89–94. http://dx.doi.org/10.11113/ijic.v11n2.291.
Full textMahalakshmi, M. Vignesh, and G. T. Shrivakshan. "An Efficient Cloud Computing Security in Healthcare Management System." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 8 (August 30, 2017): 185. http://dx.doi.org/10.23956/ijarcsse.v7i8.48.
Full textHaliuk, Serhii, Oleh Krulikovskyi, Dmytro Vovchuk, and Fernando Corinto. "Memristive Structure-Based Chaotic System for PRNG." Symmetry 14, no. 1 (January 4, 2022): 68. http://dx.doi.org/10.3390/sym14010068.
Full textRamu Kuchipudi, Ramu, Dr Ahmed Abdul Moiz Qyser, and Dr V V S S S Balaram. "Energy efficient Key Distribution for Wireless Sensor Networks." International Journal of Engineering & Technology 7, no. 4.6 (September 25, 2018): 45. http://dx.doi.org/10.14419/ijet.v7i4.6.20234.
Full textIbrahim, Anas, Alexander Chefranov, Nagham Hamad, Yousef-Awwad Daraghmi, Ahmad Al-Khasawneh, and Joel J. P. C. Rodrigues. "NTRU-Like Random Congruential Public-Key Cryptosystem for Wireless Sensor Networks." Sensors 20, no. 16 (August 17, 2020): 4632. http://dx.doi.org/10.3390/s20164632.
Full textSelvakumar, K., and S. Naveen Kumar. "Multivariate Quadratic Quasigroup Polynomial based Cryptosystem in Vanet." International Journal of Engineering & Technology 7, no. 4.10 (October 2, 2018): 832. http://dx.doi.org/10.14419/ijet.v7i4.10.26767.
Full textZhang, Yaming, and Chaozhuo Zhang. "Improving the Application of Blockchain Technology for Financial Security in Supply Chain Integrated Business Intelligence." Security and Communication Networks 2022 (May 9, 2022): 1–8. http://dx.doi.org/10.1155/2022/4980893.
Full textMustika, Laila. "Implementasi Algoritma AES Untuk Pengamanan Login Dan Data Customer Pada E-Commerce Berbasis Web." JURIKOM (Jurnal Riset Komputer) 7, no. 1 (February 15, 2020): 148. http://dx.doi.org/10.30865/jurikom.v7i1.1943.
Full textCynthia, Antony, and V. Saravanan. "Tango Binary Search Tree Based Asymmetric Cryptographic Sensor Node Authentication for Secured Communication in Wireless Sensor Networks." Sensor Letters 18, no. 1 (January 1, 2020): 55–63. http://dx.doi.org/10.1166/sl.2020.4189.
Full textAstafiev, A. V., and T. O. Shardin. "DATA EXCHANGE TECHNOLOGY BASED ON THE HANDSHAKE PROTOCOL FOR INDUSTRIAL AUTOMATION SYSTEM." Proceedings of the Southwest State University 22, no. 2 (April 28, 2018): 27–33. http://dx.doi.org/10.21869/2223-1560-2018-22-2-27-33.
Full textWang, Chuntao, Renxin Liang, Shancheng Zhao, Shan Bian, and Zhimao Lai. "Enhancing Performance of Lossy Compression on Encrypted Gray Images through Heuristic Optimization of Bitplane Allocation." Symmetry 13, no. 12 (December 6, 2021): 2338. http://dx.doi.org/10.3390/sym13122338.
Full textNavatejareddy, Ramireddy, Muthukuru Jayabhaskar, and Bachala Sathyanarayana. "Elliptical curve cryptography image encryption scheme with aid of optimization technique using gravitational search algorithm." Indonesian Journal of Electrical Engineering and Computer Science 25, no. 1 (January 1, 2022): 247. http://dx.doi.org/10.11591/ijeecs.v25.i1.pp247-255.
Full textDubovitskaya, Alevtina, Furqan Baig, Zhigang Xu, Rohit Shukla, Pratik Sushil Zambani, Arun Swaminathan, Md Majid Jahangir, et al. "ACTION-EHR: Patient-Centric Blockchain-Based Electronic Health Record Data Management for Cancer Care." Journal of Medical Internet Research 22, no. 8 (August 21, 2020): e13598. http://dx.doi.org/10.2196/13598.
Full textGuo, Junqi, Minghui Yang, and Boxin Wan. "A Practical Privacy-Preserving Publishing Mechanism Based on Personalized k-Anonymity and Temporal Differential Privacy for Wearable IoT Applications." Symmetry 13, no. 6 (June 9, 2021): 1043. http://dx.doi.org/10.3390/sym13061043.
Full textMatveichuk, T., V. Smychok, and S. Filimonov. "COMPARATIVE ANALYSIS OF TEXT DATA ASYMMETRIC ENCRYPTION METHODS." Electronics and Information Technologies 14 (2020). http://dx.doi.org/10.30970/eli.14.2.
Full textMoumen, Abdelkader, and Hocine Sissaoui. "Images Encryption Method using Steganographic LSB Method, AES and RSA algorithm." Nonlinear Engineering 6, no. 1 (January 1, 2017). http://dx.doi.org/10.1515/nleng-2016-0010.
Full textOrtiz, Santiago Marquez, Octavio Jose Salcedo Parra, and Miguel J. Espitia R. "Encryption through the use of fractals." INTERNATIONAL JOURNAL OF MATHEMATICAL ANALYSIS, 2017, 1029–40. http://dx.doi.org/10.12988/ijma.2017.710139.
Full textLi, Hui, and Ming Li. "Patent data access control and protection using blockchain technology." Scientific Reports 12, no. 1 (February 17, 2022). http://dx.doi.org/10.1038/s41598-022-05215-w.
Full textHodges, Philip, and Douglas Stebila. "Algorithm Substitution Attacks: State Reset Detection and Asymmetric Modifications." IACR Transactions on Symmetric Cryptology, June 11, 2021, 389–422. http://dx.doi.org/10.46586/tosc.v2021.i2.389-422.
Full text