Journal articles on the topic 'Blowfish Privacy'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 46 journal articles for your research on the topic 'Blowfish Privacy.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Liu, Jiaxiang, Karl Knopf, Yiqing Tan, Bolin Ding, and Xi He. "Catch a blowfish alive." Proceedings of the VLDB Endowment 14, no. 12 (July 2021): 2859–62. http://dx.doi.org/10.14778/3476311.3476363.
Full textChicha, Elie, Bechara Al Bouna, Mohamed Nassar, Richard Chbeir, Ramzi A. Haraty, Mourad Oussalah, Djamal Benslimane, and Mansour Naser Alraja. "A User-Centric Mechanism for Sequentially Releasing Graph Datasets under Blowfish Privacy." ACM Transactions on Internet Technology 21, no. 1 (February 2021): 1–25. http://dx.doi.org/10.1145/3431501.
Full textEt. al., Pravin Soni,. "Performance Analysis of Cascaded Hybrid Symmetric Encryption Models." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (April 10, 2021): 1699–708. http://dx.doi.org/10.17762/turcomat.v12i2.1506.
Full textEzadeen, Shamil, and Auday H. Alwattar. "Survey of Blowfish Algorithm for Cloud." Technium: Romanian Journal of Applied Sciences and Technology 4, no. 6 (June 28, 2022): 18–28. http://dx.doi.org/10.47577/technium.v4i6.6791.
Full textEdwards, Tobias, Benjamin I. P. Rubinstein, Zuhe Zhang, and Sanming Zhou. "A Graph Symmetrization Bound on Channel Information Leakage Under Blowfish Privacy." IEEE Transactions on Information Theory 68, no. 1 (January 2022): 538–48. http://dx.doi.org/10.1109/tit.2021.3120371.
Full textDalave, Chetan Vijaykumar, Anushka Alok Lodh, and Tushar Vijaykumar Dalave. "Secure the File Storage on Cloud Computing Using Hybrid Cryptography Algorithm." International Journal for Research in Applied Science and Engineering Technology 10, no. 4 (April 30, 2022): 672–76. http://dx.doi.org/10.22214/ijraset.2022.41332.
Full textKumari, Nidhi, and Prof Vimmi Malhotra. "Secure Cloud Data Storage Using Hybrid Cryptography." International Journal for Research in Applied Science and Engineering Technology 10, no. 4 (April 30, 2022): 60–63. http://dx.doi.org/10.22214/ijraset.2022.41081.
Full textLiu, Changchang, Xi He, Thee Chanyaswad, Shiqiang Wang, and Prateek Mittal. "Investigating Statistical Privacy Frameworks from the Perspective of Hypothesis Testing." Proceedings on Privacy Enhancing Technologies 2019, no. 3 (July 1, 2019): 233–54. http://dx.doi.org/10.2478/popets-2019-0045.
Full textAmbika, M., Mangayarkarasi N., Raghuraman Gopalsamy, L. Sai Ramesh, and Kamalanathan Selvakumar. "Secure and Dynamic Multi-Keyword Ranked Search." International Journal of Operations Research and Information Systems 12, no. 3 (July 2021): 1–10. http://dx.doi.org/10.4018/ijoris.20210701.oa3.
Full textIftikhar, U., K. Asrar, M. Waqas, and S. A. Ali. "Evaluating the Performance Parameters of Cryptographic Algorithms for IOT-based Devices." Engineering, Technology & Applied Science Research 11, no. 6 (December 11, 2021): 7867–74. http://dx.doi.org/10.48084/etasr.4263.
Full textEt. al., Ch Chakradhara Rao,. "Enhanced Effective and Privacy Preserving Multi Keyword Search over Encrypted Data in Cloud Storage Using Blowfish Algorithm." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (April 11, 2021): 2845–53. http://dx.doi.org/10.17762/turcomat.v12i2.2316.
Full textSelvi, M., and B. Ramakrishnan. "Secured Message Broadcasting in VANET using Blowfish Algorithm with Oppositional Deer Hunting Optimization." International Journal of Computer Network and Information Security 13, no. 2 (April 8, 2021): 39–52. http://dx.doi.org/10.5815/ijcnis.2021.02.04.
Full textRaut, Kinjal. "A Comprehensive Review of Cryptographic Algorithms." International Journal for Research in Applied Science and Engineering Technology 9, no. 12 (December 31, 2021): 1750–56. http://dx.doi.org/10.22214/ijraset.2021.39581.
Full textS, Nithyadevi, and Dr Sasirekha V. "An Efficient Vehicle Privacy Preservation Scheme with Enhanced Blowfish Encryption Algorithm for Ensuring Security in Vehicular Ad-Hoc Network (VANET)." Journal of Advanced Research in Dynamical and Control Systems 12, no. 05-SPECIAL ISSUE (May 30, 2020): 406–13. http://dx.doi.org/10.5373/jardcs/v12sp5/20201774.
Full textRifa’i, Annas, and Lilis Cucu Sumartini. "IMPLEMENTASI KRIPTOGRAFI MENGGUNAKAN METODE BLOWFISH DAN BASE64 UNTUK MENGAMANKAN DATABASE INFORMASI AKADEMIK PADA KAMPUS AKADEMI TELEKOMUNIKASI BOGOR BERBASIS WEB-BASED." Jurnal E-Komtek (Elektro-Komputer-Teknik) 3, no. 2 (November 12, 2019): 87–96. http://dx.doi.org/10.37339/e-komtek.v3i2.133.
Full textGoyal, Mani, and Avinash Sharma. "A Framework for Assessing Security Strength of Cloud Computing Service." Journal of Computational and Theoretical Nanoscience 16, no. 10 (October 1, 2019): 4389–93. http://dx.doi.org/10.1166/jctn.2019.8530.
Full textRaja, S. P. "Multiscale transform-based secured joint efficient medical image compression-encryption using symmetric key cryptography and ebcot encoding technique." International Journal of Wavelets, Multiresolution and Information Processing 17, no. 05 (September 2019): 1950034. http://dx.doi.org/10.1142/s0219691319500346.
Full textSolanki, Madan, and Prof (Dr ). Vrinda Tokekar. "Design and Implementation of Strong Security Architecture for Amazon Web Service based on Cloud Applications." International Journal of Innovative Technology and Exploring Engineering 11, no. 12 (November 30, 2022): 17–22. http://dx.doi.org/10.35940/ijitee.l9324.11111222.
Full textLalita Kumar Parvataneni, Mohith, Eswara Sai Nath Adusumalli, and Rajeshbabu C. "Secure and Efficient Query Processing Using Randomized Encryption and De-duplication on the Cloud." International Journal of Engineering & Technology 7, no. 2.24 (April 25, 2018): 311. http://dx.doi.org/10.14419/ijet.v7i2.24.12071.
Full textNita, Stefania, Marius Mihailescu, and Valentin Pau. "Security and Cryptographic Challenges for Authentication Based on Biometrics Data." Cryptography 2, no. 4 (December 6, 2018): 39. http://dx.doi.org/10.3390/cryptography2040039.
Full textJabbar, Arshi, and Prof Umesh Lilhore. "Design and Implementation of Hybrid EC-RSA Security Algorithm Based on TPA for Cloud Storage." SMART MOVES JOURNAL IJOSCIENCE 3, no. 11 (November 30, 2017): 6. http://dx.doi.org/10.24113/ojsscience.v3i10.148.
Full textHema S and Dr.Kangaiammal A. "A Secure Method for Managing Data in Cloud Storage using Deduplication and Enhanced Fuzzy Based Intrusion Detection Framework." November 2020 6, no. 11 (November 30, 2020): 165–73. http://dx.doi.org/10.46501/ijmtst061131.
Full textIrfan, Pahrul, Rifqi Hammad, Andi Sofyan Anas, Fatimatuzzahra Fatimatuzzahra, and Nanang Samudra. "Application of the Blowfish Algorithm in securing patient data in the database." MATRIX : Jurnal Manajemen Teknologi dan Informatika 12, no. 2 (July 31, 2022): 102–8. http://dx.doi.org/10.31940/matrix.v12i2.102-108.
Full textHS, Christnatalis, and Amir Mahmud Husein. "Digital Signs Security System using AES-Blowfish-RSA Hybrid Cryptography Approach." SinkrOn 4, no. 1 (October 11, 2019): 185. http://dx.doi.org/10.33395/sinkron.v4i1.10244.
Full textAbu-Faraj, Mua’ad, Abeer Al-Hyari, and Ziad Alqadi. "A Complex Matrix Private Key to Enhance the Security Level of Image Cryptography." Symmetry 14, no. 4 (March 24, 2022): 664. http://dx.doi.org/10.3390/sym14040664.
Full textElangovan, Dinesh, and Ramesh Muthiya. "Design and Implementation of Crypt Analysis of Cloud Data Intrusion Management System." International Arab Journal of Information Technology 17, no. 6 (November 1, 2020): 895–905. http://dx.doi.org/10.34028/iajit/17/6/8.
Full textHtet, May, and Su Wai Phyo. "A Novel Text Steganographic Technique Using Specific Alphabets." Journal of Computer Science 2, no. 1 (July 16, 2016): 1–11. http://dx.doi.org/10.31357/jcs.v2i1.2721.
Full textChatterjee, Ayan, and Andreas Prinz. "Applying Spring Security Framework with KeyCloak-Based OAuth2 to Protect Microservice Architecture APIs: A Case Study." Sensors 22, no. 5 (February 22, 2022): 1703. http://dx.doi.org/10.3390/s22051703.
Full textSeada Abdu Wakene, Sisay Muleta Hababa, Gutema Seboka Daba, and K S Ananda Kumar. "Data Storage Security in Mobile Cloud Computing (MCC) using Improved Blowfish Algorithm." International Journal of Scientific Research in Computer Science, Engineering and Information Technology, November 15, 2021, 100–111. http://dx.doi.org/10.32628/cseit217620.
Full text"Secure Ranked Multi-Keyword Search based on Modified Blowfish Algorithm and AVL Tree in Untrusted Cloud Environment." International Journal of Engineering and Advanced Technology 9, no. 1 (October 30, 2019): 6738–44. http://dx.doi.org/10.35940/ijeat.a2041.109119.
Full textAlabdulrazzaq, Haneen, and Mohammed N. Alenezi. "Performance Evaluation of Cryptographic Algorithms: DES, 3DES, Blowfish, Twofish, and Threefish." International Journal of Communication Networks and Information Security (IJCNIS) 14, no. 1 (April 15, 2022). http://dx.doi.org/10.17762/ijcnis.v14i1.5262.
Full text"Enhancing Image Security by employing Blowfish Algorithm further embedding text and Stitching the RGB components of a Host Image." International Journal of Recent Technology and Engineering 8, no. 2S11 (November 2, 2019): 3801–8. http://dx.doi.org/10.35940/ijrte.b1499.0982s1119.
Full text"Secure And Dynamic Multi Keyword Ranked Search." International Journal of Operations Research and Information Systems 12, no. 3 (July 2021): 0. http://dx.doi.org/10.4018/ijoris.20210701oa03.
Full textFahriah, Wildatunnisa, and Tulus Febrianto. "Aplikasi Enkripsi dan Dekripsi Short Message Service di Android Menggunakan Metode Blowfish." JISA(Jurnal Informatika dan Sains) 2, no. 1 (June 27, 2019). http://dx.doi.org/10.31326/jisa.v2i1.512.
Full textPermana, Angga Aditya. "APLIKASI PENYISIPAN TEKS PADA GAMBAR DENGAN ALGORITMA BLOWFISH DAN LEAST SIGNIFICANT BIT." JIKA (Jurnal Informatika) 1, no. 1 (June 17, 2017). http://dx.doi.org/10.31000/jika.v1i1.718.
Full textPermana, Angga Aditya. "APLIKASI PENYISIPAN TEKS PADA GAMBAR DENGAN ALGORITMA BLOWFISH DAN LEAST SIGNIFICANT BIT." JIKA (Jurnal Informatika) 1, no. 1 (May 8, 2018). http://dx.doi.org/10.31000/jika.v1i1.743.
Full textDinesh, E., and S. M. Ramesh. "Security Aware Data Transaction Using Optimized Blowfish Algorithm in Cloud Environment." Journal of Circuits, Systems and Computers, July 18, 2020, 2150004. http://dx.doi.org/10.1142/s0218126621500043.
Full textBarhoom, Tawfiq, and Mahmoud Abu Shawish. "Text File Privacy on the Cloud Based on Diagonal Fragmentation and Encryption." Journal of Engineering Research and Technology 8, no. 1 (March 3, 2021). http://dx.doi.org/10.33976/jert.8.1/2021/3.
Full text"Security and Confidentiality of the Data using Block Level in Health Care System." International Journal of Recent Technology and Engineering 8, no. 2 (July 30, 2019): 2947–51. http://dx.doi.org/10.35940/ijrte.b2656.078219.
Full textMr. Shrikanta Jogar and Mr. Darshan S Handral. "Secure File Storage on Cloud Using Hybrid Cryptography." International Journal of Advanced Research in Science, Communication and Technology, July 23, 2022, 540–51. http://dx.doi.org/10.48175/ijarsct-5861.
Full text"Security Enhancement in Cryptography for Mobile Device Outsourced in Cloud Computing." International Journal of Innovative Technology and Exploring Engineering 9, no. 8 (June 10, 2020): 971–75. http://dx.doi.org/10.35940/ijitee.h6780.069820.
Full textKaviya, K., K. K. Shanthini, and M. Sujithra. "Evolving Cryptographic Approach for Enhancing Security of Resource Constrained Mobile Device Outsourced Data in Cloud Computing." International Journal of Scientific Research in Computer Science, Engineering and Information Technology, January 5, 2019, 101–6. http://dx.doi.org/10.32628/cseit195111.
Full textAlenezi, Mohammed N., and Fawaz S. Al-Anzi. "A Study of Z-Transform Based Encryption Algorithm." International Journal of Communication Networks and Information Security (IJCNIS) 13, no. 2 (April 15, 2022). http://dx.doi.org/10.17762/ijcnis.v13i2.5052.
Full text"Two Layer Image Encryption using Symmetric Key Algorithms." International Journal of Innovative Technology and Exploring Engineering 9, no. 7 (May 10, 2020): 1056–59. http://dx.doi.org/10.35940/ijitee.g5285.059720.
Full text"Progressing Biometric Security Concern with Blowfish Algorithm." International Journal of Innovative Technology and Exploring Engineering 8, no. 9S2 (August 31, 2019): 166–71. http://dx.doi.org/10.35940/ijitee.i1032.0789s219.
Full text"FCNN Model for Diagnosis and Analysis of Symmetric Key Cryptosystem." Iraqi Journal for Computer Science and Mathematics, November 2, 2022, 53–61. http://dx.doi.org/10.52866/ijcsm.2023.01.01.006.
Full text