Journal articles on the topic 'Encryption'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Encryption.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Sun, Chenbo. "Comparative Study of RSA Encryption and Quantum Encryption." Theoretical and Natural Science 2, no. 1 (February 20, 2023): 121–25. http://dx.doi.org/10.54254/2753-8818/2/20220098.
Full textPourasad, Yaghoub, Ramin Ranjbarzadeh, and Abbas Mardani. "A New Algorithm for Digital Image Encryption Based on Chaos Theory." Entropy 23, no. 3 (March 13, 2021): 341. http://dx.doi.org/10.3390/e23030341.
Full textArtajaya, Gede Krisna Surya, Agus Muliantara, I. Gusti Ngurah Anom Cahyadi Putra, and I. Ketut Gede Suhartana. "Aplikasi Enkripsi Pesan E-Mail Menggunakan Hybrid Cryptosystem AES dan RSA." JELIKU (Jurnal Elektronik Ilmu Komputer Udayana) 13, no. 2 (January 13, 2025): 435. https://doi.org/10.24843/jlk.2024.v13.i02.p21.
Full textThabit, Zainab Hasan, Sadiq A. Mehdi, and Bashar M. Nema. "Enhancing Color Image Security: Encryption with Dynamic Chaotic Three-Dimensional System and Robust Security Analysis." Al-Mustansiriyah Journal of Science 34, no. 4 (December 30, 2023): 87–95. http://dx.doi.org/10.23851/mjs.v34i4.1411.
Full textEt. al., Jaichandran R,. "A Hybrid Encryption Model with Attribute Based Encryption and Advanced Encryption Standard Techniques." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (April 11, 2021): 334–36. http://dx.doi.org/10.17762/turcomat.v12i2.720.
Full textAlawi, Attaa R., and Nidaa F. Hassan. "A Proposal Video Encryption Using Light Stream Algorithm." Engineering and Technology Journal 39, no. 1B (March 25, 2021): 184–96. http://dx.doi.org/10.30684/etj.v39i1b.1689.
Full textHuang, Eric. "An Exploration of RSA Encryption." Innovation in Science and Technology 3, no. 6 (November 2024): 83–86. https://doi.org/10.56397/ist.2024.11.09.
Full textZhu, Bingxin, Puwen Wei, and Mingqiang Wang. "Adaptive Security of Broadcast Encryption, Revisited." Security and Communication Networks 2017 (2017): 1–16. http://dx.doi.org/10.1155/2017/1404279.
Full textZhang, Jian, and Yutong Zhang. "An Image Encryption Algorithm Based on Balanced Pixel and Chaotic Map." Mathematical Problems in Engineering 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/216048.
Full textLiu, Yibo. "Discussion and Optimization of AES and SM4 Encryption Algorithms." Frontiers in Computing and Intelligent Systems 12, no. 1 (April 28, 2025): 119–24. https://doi.org/10.54097/cm6eq023.
Full textNori, Ahmed S., and Ansam O. Abdulmajeed. "Design and implementation of Threefish cipher algorithm in PNG file." Sustainable Engineering and Innovation 3, no. 2 (May 29, 2021): 79–91. http://dx.doi.org/10.37868/sei.v3i2.id131.
Full textDr., Khaled Musa. "Evaluating Encryption Algorithm Method Based on Software Encryption Tools for Information Security." International Journal of Current Science Research and Review 06, no. 06 (June 7, 2023): 3188–94. https://doi.org/10.5281/zenodo.8013027.
Full textFarhan, Mohammed Mahmoud. "Image Authentication Using Public Key." Al-Salam Journal for Engineering and Technology 4, no. 1 (September 6, 2024): 78–87. http://dx.doi.org/10.55145/ajest.2025.04.01.007.
Full textAlslman, Yasmeen, Eman Alnagi, Ashraf Ahmad, Yousef AbuHour, Remah Younisse, and Qasem Abu Al-haija. "Hybrid Encryption Scheme for Medical Imaging Using AutoEncoder and Advanced Encryption Standard." Electronics 11, no. 23 (November 30, 2022): 3967. http://dx.doi.org/10.3390/electronics11233967.
Full textNamdeo, Thorat Nilesh, Amit Singla, and Tanaji Dhaigude. "VISUAL CRYPTOGRAPHY WITH COLOR IMAGE ENCRYPTION VIA IMPROVED ELLIPTIC CURVE CRYPTOGRAPHY (ECC) AND OTP GENERATION: SELF-IMPROVED GOLD RUSH OPTIMIZATION ALGORITHM FOR OPTIMAL KEY GENERATION." International Journal of Innovations & Research Analysis 04, no. 03(I) (September 15, 2024): 52–58. http://dx.doi.org/10.62823/ijira/4.3(i).6808.
Full textAli Pitchay, Sakinah, Wail Abdo Ali Alhiagem, Farida Ridzuan, and Sundresan Perumal. "Mobile Application Design for Protecting the Data in Cloud Using Enhanced Technique of Encryption." International Journal of Engineering & Technology 7, no. 4.15 (October 7, 2018): 98. http://dx.doi.org/10.14419/ijet.v7i4.15.21427.
Full textH Al-khafaji, Kawther, and Hanan A. Al-Haidari A.Al-Haidari. "Gray X-Ray medical images encryption and decryption by chaotic algorithm." Modern Journal of Health and Applied Sciences 2, no. 1 (March 15, 2025): 1–11. https://doi.org/10.70411/mjhas.2.1.2025143.
Full textAlzain, Mohammed. "Chaos Baker-based Image Encryption in Operation Modes." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 17, no. 1 (January 16, 2018): 7153–63. http://dx.doi.org/10.24297/ijct.v17i1.7328.
Full textRiyaz Fathima Abdul and Saravanan Arumugam. "A Novel Data Transmission Model Using Hybrid Encryption Scheme for Preserving Data Integrity." Advances in Technology Innovation 10, no. 1 (January 23, 2025): 15–28. https://doi.org/10.46604/aiti.2024.14114.
Full textZhang, Zhenhua, Deqi Huang, Yating Tu, and Zikuang Ye. "Layer multiplexing and DNA based color image encryption." Journal of Physics: Conference Series 2858, no. 1 (October 1, 2024): 012039. http://dx.doi.org/10.1088/1742-6596/2858/1/012039.
Full textWu, Yuchen. "Theoretical Analysis of AES Encryption Optimization Based on Quaternions and Rotation Matrices." Theoretical and Natural Science 100, no. 1 (March 31, 2025): 75–82. https://doi.org/10.54254/2753-8818/2025.21702.
Full textKulwinder, Kaur*1 &. Brahmaleen Kaur Sidhu2. "AN HYBRID APPROACH FOR EFFICIENT DATA ENCRYPTION AND DECRYPTION FOR DATA SECURITY IN CLOUD COMPUTING." GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES 5, no. 9 (September 18, 2018): 188–93. https://doi.org/10.5281/zenodo.1421045.
Full textKuo, Tzu-Hsiang, and Ja-Ling Wu. "A High Throughput BFV-Encryption-Based Secure Comparison Protocol." Mathematics 11, no. 5 (March 2, 2023): 1227. http://dx.doi.org/10.3390/math11051227.
Full textMandangan, Arif, and Irene Lim Jin Ying. "Chaotic Encryption Scheme for Colour Image using 3D Lorenz Chaotic Map and 3D Chen System." International Journal of Computational Thinking and Data Science 1, no. 1 (April 15, 2024): 10–24. http://dx.doi.org/10.37934/ctds.1.1.1024.
Full textIrene Lim Jin Ying and Arif Mandangan. "Chaotic Encryption Scheme for Colour Image using 3D Lorenz Chaotic Map and 3D Chen System." International Journal of Advanced Research in Computational Thinking and Data Science 1, no. 1 (April 15, 2025): 10–24. https://doi.org/10.37934/ctds.1.1.1024a.
Full textQizi, Toshboyeva Feruza To'lqin, and Bebutova Zulayxo Hamidovna. "MODERN METHODS AND ESSENCE OF ENSURING INFORMATION SECURITY IN THE INFORMATION SOCIETY." European Journal of Contemporary Business Law & Technology: Cyber Law, Blockchain, and Legal Innovations 1, no. 7 (August 27, 2024): 106–11. https://doi.org/10.61796/ejcblt.v1i7.872.
Full textParenreng, Jumadi Mabe, Sahraeni Maulida Mustari, and Abdul Wahid. "E-mail Security System Using El-Gamal Hybrid Algorithm and AES (Advanced Encryption Standard) Algorithm." Internet of Things and Artificial Intelligence Journal 2, no. 1 (February 16, 2022): 1–9. http://dx.doi.org/10.31763/iota.v2i1.510.
Full textRamanathan, Thirumalaimuthu, Md Jakir Hossen, Md Shohel Sayeed, and Joseph Emerson Raja. "Survey on computational intelligence based image encryption techniques." Indonesian Journal of Electrical Engineering and Computer Science 19, no. 3 (September 1, 2020): 1428. http://dx.doi.org/10.11591/ijeecs.v19.i3.pp1428-1435.
Full textThirumalaimuthu, T. Ramanathan, Hossen J., Sayeed S., and Emerson Raja J. "Survey on computational intelligence based image encryption techniques." Indonesian Journal of Electrical Engineering and Computer Science 19, no. 3 (September 1, 2020): 1428–35. https://doi.org/10.11591/ijeecs.v19.i3.pp1428-1435.
Full textYeow, Sin-Qian, and Kok-Why Ng. "Neural Network Based Data Encryption: A Comparison Study among DES, AES, and HE Techniques." JOIV : International Journal on Informatics Visualization 7, no. 3-2 (November 30, 2023): 2086. http://dx.doi.org/10.30630/joiv.7.3-2.2336.
Full textSHIBU BAI, Mr SHANE. "Recovering and Analysing Data from Encrypted Devices." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (April 23, 2025): 1–9. https://doi.org/10.55041/ijsrem45625.
Full textHuda Anwar and Zill e Shams. "Algorithms of Encryption Using Graph Theory." Mathematical Sciences and Applications 2, no. 2 (December 31, 2023): 73–85. http://dx.doi.org/10.52700/msa.v2i2.16.
Full textAbeer Salim Jamil, Raghad Abdulaali Azeez, and Nidaa Flaih Hassan. "An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments." International Journal of Online and Biomedical Engineering (iJOE) 19, no. 01 (January 17, 2023): 93–106. http://dx.doi.org/10.3991/ijoe.v19i01.36901.
Full textAitkhozhayeva, Y. Zh, and D. S. Akhmetsharipov. "Technology for using special encryption functions in PostgreSQL." Bulletin of the National Engineering Academy of the Republic of Kazakhstan 91, no. 1 (March 15, 2024): 21–29. http://dx.doi.org/10.47533/2024.1606-146x.02.
Full textWang, Pengfei, Yixu Wang, Jiafu Xiang, and Xiaoling Xiao. "Fast Image Encryption Algorithm for Logistics-Sine-Cosine Mapping." Sensors 22, no. 24 (December 16, 2022): 9929. http://dx.doi.org/10.3390/s22249929.
Full textHuang, Xing Li, and Huan Chun Yang. "Two-Way ID Authentication and Hardware Encryption-Based Security Design of Mobile Hard Disk." Applied Mechanics and Materials 58-60 (June 2011): 573–78. http://dx.doi.org/10.4028/www.scientific.net/amm.58-60.573.
Full textVaishnavi Agrawal. "Enhancing Privacy on Online Social Networs: A comparative study of encryption techniques." Journal of Advances and Scholarly Researches in Allied Education 21, no. 5 (September 3, 2024): 25–32. http://dx.doi.org/10.29070/cqryaz86.
Full textAgarwal, Sohit, and Gagan Joshi. "Hybrid Encryption of Cloud Processing With IOT Devices Using DNA And RSA Cryptography." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 6 (July 10, 2023): 21–27. http://dx.doi.org/10.17762/ijritcc.v11i6.6767.
Full textLi, Bingcheng, Dingkang Li, and Mingyuan Zhu. "Application analysis of data encryption technology." Applied and Computational Engineering 50, no. 1 (March 25, 2024): 199–205. http://dx.doi.org/10.54254/2755-2721/50/20241502.
Full textLimbachia, Dipen. "Encryption of Card Details Using AES with a 128-bit Key a Secure Approach to Data Protection." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 03 (March 25, 2024): 1–5. http://dx.doi.org/10.55041/ijsrem29484.
Full textAlsalam Ali, Nashwan, Abdul Monem S. Rahma, and Shaimaa H. Shaker. "Survey on 3D Content Encryption." International Journal of Interactive Mobile Technologies (iJIM) 15, no. 15 (August 11, 2021): 115. http://dx.doi.org/10.3991/ijim.v15i15.24179.
Full textMichael, N. John, Ozioma Ogoegbulem, Victor Obukohwo, and Etaroghene Egbogho Henry. "NUMBER THEORY IN RSA ENCRYPTION SYSTEMS." GPH - International Journal of Mathematics 06, no. 11 (November 26, 2023): 07–16. https://doi.org/10.5281/zenodo.10209900.
Full textSinha, Mr Anurag, and Mr Amrit Kumar Bhadani. "Double Layer Cryptography using Multiplicative Cipher and Chemical Periodic Table." Indian Journal of Data Communication and Networking 1, no. 2 (April 10, 2021): 21–30. http://dx.doi.org/10.35940/ijdcn.b5008.041221.
Full textSinha, Mr Anurag, and Mr Amrit Kumar Bhadani. "Double Layer Cryptography using Multiplicative Cipher and Chemical Periodic Table." Indian Journal of Data Communication and Networking 1, no. 2 (April 10, 2021): 21–30. http://dx.doi.org/10.54105/ijdcn.b5008.041221.
Full textPushpendra, Tiwari. "A study and comparison of the various cryptography technique standards within fifteen factors." i-manager's Journal on Digital Forensics & Cyber Security 1, no. 1 (2023): 21. http://dx.doi.org/10.26634/jdf.1.1.19134.
Full textIrzayzah, Mr Samyrah M. Abu. "A New Application for Encryption and Decryption Using the TAS Algorithm." International Journal for Research in Applied Science and Engineering Technology 11, no. 11 (November 30, 2023): 2428–44. http://dx.doi.org/10.22214/ijraset.2023.56928.
Full textAnurag, Sinha, and Kumar Bhadani Amrit. "Double Layer Cryptography using Multiplicative Cipher and Chemical Periodic Table." Indian Journal of Data Communication and Networking (IJDCN) 1, no. 2 (April 10, 2021): 21–30. https://doi.org/10.54105/ijdcn.B5008.041221.
Full textKovalchuk, A. M., Yuriy Peleckh, and Tetiana Bubela. "BIT OPERATIONS WITH ELEMENTS OF THE RSA ALGORITHM IN ENCRYPTION-DECRYPTION OF COLOR IMAGES." Measuring Equipment and Metrology 83, no. 3 (2022): 5–10. http://dx.doi.org/10.23939/istcmtm2022.03.005.
Full textYu, Wanbo, and Hao Wang. "Analysis of trigonometric chaotic sequence by proposing an index-based bit level scrambling image encryption." Modern Physics Letters B 35, no. 24 (July 8, 2021): 2150406. http://dx.doi.org/10.1142/s0217984921504066.
Full textLi, Zongwei. "Data Privacy Protection Utilizing Homomorphic Encryption Techniques." Applied and Computational Engineering 135, no. 1 (February 21, 2025): 1–9. https://doi.org/10.54254/2755-2721/2025.21090.
Full text