Academic literature on the topic 'Probabilistic data encryption'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Probabilistic data encryption.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Probabilistic data encryption"
Mazumder, Rashed, Atsuko Miyaji, and Chunhua Su. "Probably Secure Keyed-Function Based Authenticated Encryption Schemes for Big Data." International Journal of Foundations of Computer Science 28, no. 06 (September 2017): 661–82. http://dx.doi.org/10.1142/s0129054117400123.
Full textLeung, K. C., S. L. Li, L. M. Cheng, and C. K. Chan. "A Symmetric Probabilistic Encryption Scheme Based On CHNN Without Data Expansion." Neural Processing Letters 24, no. 2 (September 20, 2006): 93–105. http://dx.doi.org/10.1007/s11063-006-9006-9.
Full textAruna, M. G., and K. G. Mohan. "Secured cloud data migration technique by competent probabilistic public key encryption." China Communications 17, no. 5 (May 2020): 168–90. http://dx.doi.org/10.23919/jcc.2020.05.014.
Full textKulshrestha, Vartika, Seema Verma, and C. Rama Krishna. "Hybrid probabilistic triple encryption approach for data security in cloud computing." International Journal of Advanced Intelligence Paradigms 21, no. 1/2 (2022): 158. http://dx.doi.org/10.1504/ijaip.2022.121035.
Full textZhu, Li Juan. "A Network Identity Authentication Protocol Based on Fingerprint and Probabilistic Encryption of RSA." Applied Mechanics and Materials 241-244 (December 2012): 2471–74. http://dx.doi.org/10.4028/www.scientific.net/amm.241-244.2471.
Full textKulshrestha, Vartika, Seema Verma, and C. Rama Krishna. "Hybrid Probabilistic Triple Encryption (HPRRA) Approach for Data Security in Cloud Computing." International Journal of Advanced Intelligence Paradigms 1, no. 1 (2021): 1. http://dx.doi.org/10.1504/ijaip.2021.10036005.
Full textLuna, Jose Marcio, Chaouki T. Abdallah, and Gregory L. Heileman. "Probabilistic Optimization of Resource Distribution and Encryption for Data Storage in the Cloud." IEEE Transactions on Cloud Computing 6, no. 2 (April 1, 2018): 428–39. http://dx.doi.org/10.1109/tcc.2016.2543728.
Full textZhang, Jing-Wen, Xiu-Bo Chen, Gang Xu, and Yi-Xian Yang. "Universal quantum circuit evaluation on encrypted data using probabilistic quantum homomorphic encryption scheme*." Chinese Physics B 30, no. 7 (July 1, 2021): 070309. http://dx.doi.org/10.1088/1674-1056/ac003b.
Full textGandhi, Mehak, and Kiranbir Kaur. "Enhancing Secure and Efficient Online Data Storage over Cloud Using Homomorphic with Probabilistic Encryption." International Journal of Computer Sciences and Engineering 6, no. 3 (March 30, 2018): 263–68. http://dx.doi.org/10.26438/ijcse/v6i3.263268.
Full textEt.al, Quazi Warisha Ahmed. "Energetic Data Security Management Scheme using Hybrid Encryption Algorithm over Cloud Environment." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (April 10, 2021): 201–8. http://dx.doi.org/10.17762/turcomat.v12i6.1289.
Full textDissertations / Theses on the topic "Probabilistic data encryption"
Lincoln, Laura Beth. "Symmetric private information retrieval via additive homomorphic probabilistic encryption /." Online version of thesis, 2006. https://ritdml.rit.edu/dspace/handle/1850/2792.
Full textБейнер, Петр Сергеевич. "Информационно-измерительная система мониторинга температурного режима гидротехнических сооружений АЭС." Thesis, Национальный аэрокосмический университет им. Н. Е. Жуковского "Харьковский авиационный институт", 2016. http://repository.kpi.kharkov.ua/handle/KhPI-Press/24781.
Full textThesis for scientific degree candidate of technical sciences in the specialty 05.13.05 – computer systems and components. – National Technical University "Kharkov Polytechnic Institute", Kharkov 2016. Dissertation is devoted to solving scientific and applied problems that concern the optimization of the NPP power system functioning. It is achieved by increasing monitoring accuracy of hydrothermal parameters at the hydrotechnical facilities taking into account hydrometeorological factors and the objective prediction of the circulating water temperature by means of the developed information-measurement system. The information-measurement system of the NPP hydrometeorological parameters was developed, with enhanced system of measurement, transfer, collection, backup, and analysis of parameters affecting the circulating water temperature at the NPP hydrotechnical facilities. Techniques to create energy-efficient structure of the wireless sensor networks were suggested, providing the remote measurement of the physical values extended over a large area of the NPP. The method of transferring hydrometeorological parameters within the information-measurement system was furthered, the probabilistic data encryption being used in the communication channels. It resulted in raising the security level of the measurement data against the unauthorized access and increasing the interference immunity.
Бейнер, Петро Сергійович. "Інформаційно-вимірювальна система моніторингу температурного режиму гідротехнічних споруд АЕС." Thesis, НТУ "ХПІ", 2016. http://repository.kpi.kharkov.ua/handle/KhPI-Press/24773.
Full textThesis for scientific degree candidate of technical sciences in the specialty 05.13.05 – computer systems and components. – National Technical University "Kharkov Polytechnic Institute", Kharkov 2016. Dissertation is devoted to solving scientific and applied problems that concern the optimization of the NPP power system functioning. It is achieved by increasing monitoring accuracy of hydrothermal parameters at the hydrotechnical facilities taking into account hydrometeorological factors and the objective prediction of the circulating water temperature by means of the developed information-measurement system. The information-measurement system of the NPP hydrometeorological parameters was developed, with enhanced system of measurement, transfer, collection, backup, and analysis of parameters affecting the circulating water temperature at the NPP hydrotechnical facilities. Techniques to create energy-efficient structure of the wireless sensor networks were suggested, providing the remote measurement of the physical values extended over a large area of the NPP. The method of transferring hydrometeorological parameters within the information-measurement system was furthered, the probabilistic data encryption being used in the communication channels. It resulted in raising the security level of the measurement data against the unauthorized access and increasing the interference immunity.
Books on the topic "Probabilistic data encryption"
Goldreich, Oded. Modern Cryptography, Probabilistic Proofs and Pseudorandomness. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999.
Find full textBook chapters on the topic "Probabilistic data encryption"
Adi Narayana Reddy, K., V. Madhu Viswanatham, and B. Vishnu Vardhan. "An Enhanced Probabilistic Encryption Algorithm for Secured Data Transmission." In Communications in Computer and Information Science, 284–90. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29219-4_33.
Full textKaduvu, Haripriya, V. Lavanya, and M. Saravanan. "Probabilistic Optimization of Incorporating Security Ciphers and Encryption of Data Storage in Cloud." In Artificial Intelligence Techniques for Advanced Computing Applications, 345–55. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5329-5_33.
Full text"Encryption Schemes for Anonymous Systems." In Anonymous Security Systems and Applications, 26–45. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-1649-3.ch004.
Full textKrishna, Addepalli V. N., and Balamurugan M. "Security Mechanisms in Cloud Computing-Based Big Data." In Advances in Wireless Technologies and Telecommunication, 165–95. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7335-7.ch009.
Full textKrishna, Addepalli V. N., and Balamurugan M. "Security Mechanisms in Cloud Computing-Based Big Data." In Research Anthology on Artificial Intelligence Applications in Security, 694–724. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7705-9.ch032.
Full textKrishna, Addepalli V. N., and Balamurugan M. "Security Mechanisms in Cloud Computing-Based Big Data." In Research Anthology on Blockchain Technology in Business, Healthcare, Education, and Government, 897–926. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-5351-0.ch052.
Full textKrishna, Addepalli V. N., and Balamurugan M. "Security Mechanisms in Cloud Computing-Based Big Data." In Research Anthology on Artificial Intelligence Applications in Security, 694–724. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7705-9.ch032.
Full textN., Jayapandian. "Industry 4.0 Privacy and Security Protocol Issues in Internet of Things." In IoT Architectures, Models, and Platforms for Smart City Applications, 193–217. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-1253-1.ch010.
Full textN., Jayapandian. "Industry 4.0 Privacy and Security Protocol Issues in Internet of Things." In Research Anthology on Cross-Industry Challenges of Industry 4.0, 1853–76. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-8548-1.ch094.
Full textKrishna, A. V. N. "A Randomized Cloud Library Security Environment." In Cloud Security, 1087–107. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8176-5.ch056.
Full textConference papers on the topic "Probabilistic data encryption"
Singh, Binay Kumar, Abusha Tsegaye, and Jagat Singh. "Probabilistic data encryption using elliptic curve cryptography and Arnold transformation." In 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC). IEEE, 2017. http://dx.doi.org/10.1109/i-smac.2017.8058259.
Full textSamanthula, Bharath K., Wei Jiang, and Sanjay Madria. "A Probabilistic Encryption Based MIN/MAX Computation in Wireless Sensor Networks." In 2013 14th IEEE International Conference on Mobile Data Management (MDM). IEEE, 2013. http://dx.doi.org/10.1109/mdm.2013.18.
Full textYeh, Jyh-Haw. "A Probabilistic Homomorphic Encryption Algorithm over Integers - Protecting Data Privacy in Clouds." In 2015 IEEE 12th Intl. Conf. on Ubiquitous Intelligence and Computing, 2015 IEEE 12th Intl. Conf. on Autonomic and Trusted Computing and 2015 IEEE 15th Intl. Conf. on Scalable Computing and Communications and its Associated Workshops (UIC-ATC-ScalCom). IEEE, 2015. http://dx.doi.org/10.1109/uic-atc-scalcom-cbdcom-iop.2015.130.
Full text