Academic literature on the topic 'Probabilistic data encryption'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Probabilistic data encryption.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Probabilistic data encryption"

1

Mazumder, Rashed, Atsuko Miyaji, and Chunhua Su. "Probably Secure Keyed-Function Based Authenticated Encryption Schemes for Big Data." International Journal of Foundations of Computer Science 28, no. 06 (September 2017): 661–82. http://dx.doi.org/10.1142/s0129054117400123.

Full text
Abstract:
Security, privacy and data integrity are the critical issues in Big Data application of IoT-enable environment and cloud-based services. There are many upcoming challenges to establish secure computations for Big Data applications. Authenticated encryption (AE) plays one of the core roles for Big Data’s confidentiality, integrity, and real-time security. However, many proposals exist in the research area of authenticated encryption. Generally, there are two concepts of nonce respect and nonce reuse under the security notion of the AE. However, recent studies show that nonce reuse needs to sacrifice security bound of the AE. In this paper, we consider nonce respect scheme and probabilistic encryption scheme which are more efficient and suitable for big data applications. Both schemes are based on keyed function. Our first scheme (FS) operates in parallel mode whose security is based on nonce respect and supports associated data. Furthermore, it needs less call of functions/block-cipher. On the contrary, our second scheme is based on probabilistic encryption. It is expected to be a light solution because of weaker security model construction. Moreover, both schemes satisfy reasonable privacy security bound.
APA, Harvard, Vancouver, ISO, and other styles
2

Leung, K. C., S. L. Li, L. M. Cheng, and C. K. Chan. "A Symmetric Probabilistic Encryption Scheme Based On CHNN Without Data Expansion." Neural Processing Letters 24, no. 2 (September 20, 2006): 93–105. http://dx.doi.org/10.1007/s11063-006-9006-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Aruna, M. G., and K. G. Mohan. "Secured cloud data migration technique by competent probabilistic public key encryption." China Communications 17, no. 5 (May 2020): 168–90. http://dx.doi.org/10.23919/jcc.2020.05.014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kulshrestha, Vartika, Seema Verma, and C. Rama Krishna. "Hybrid probabilistic triple encryption approach for data security in cloud computing." International Journal of Advanced Intelligence Paradigms 21, no. 1/2 (2022): 158. http://dx.doi.org/10.1504/ijaip.2022.121035.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Zhu, Li Juan. "A Network Identity Authentication Protocol Based on Fingerprint and Probabilistic Encryption of RSA." Applied Mechanics and Materials 241-244 (December 2012): 2471–74. http://dx.doi.org/10.4028/www.scientific.net/amm.241-244.2471.

Full text
Abstract:
Security transaction problem between the client and the server was solved by a network identity authentication protocol of this paper. We designed this protocol from two aspects, one is the hardware structure design, and the other is data encryption. We used fingerprint sensor to gather the user’s fingerprint and characteristic value instead of password input from keyboard, and used RSA probabilistic encryption to generate public key and private key of the client and public key and private key of the server, and then used the protocol certification process to finish operation of the data encryption and decryption. This protocol guarantees every specific legitimate user rights and prevents the hacker from attacking network data, and the practical application shows this protocol is absolutely safe.
APA, Harvard, Vancouver, ISO, and other styles
6

Kulshrestha, Vartika, Seema Verma, and C. Rama Krishna. "Hybrid Probabilistic Triple Encryption (HPRRA) Approach for Data Security in Cloud Computing." International Journal of Advanced Intelligence Paradigms 1, no. 1 (2021): 1. http://dx.doi.org/10.1504/ijaip.2021.10036005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Luna, Jose Marcio, Chaouki T. Abdallah, and Gregory L. Heileman. "Probabilistic Optimization of Resource Distribution and Encryption for Data Storage in the Cloud." IEEE Transactions on Cloud Computing 6, no. 2 (April 1, 2018): 428–39. http://dx.doi.org/10.1109/tcc.2016.2543728.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Zhang, Jing-Wen, Xiu-Bo Chen, Gang Xu, and Yi-Xian Yang. "Universal quantum circuit evaluation on encrypted data using probabilistic quantum homomorphic encryption scheme*." Chinese Physics B 30, no. 7 (July 1, 2021): 070309. http://dx.doi.org/10.1088/1674-1056/ac003b.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Gandhi, Mehak, and Kiranbir Kaur. "Enhancing Secure and Efficient Online Data Storage over Cloud Using Homomorphic with Probabilistic Encryption." International Journal of Computer Sciences and Engineering 6, no. 3 (March 30, 2018): 263–68. http://dx.doi.org/10.26438/ijcse/v6i3.263268.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Et.al, Quazi Warisha Ahmed. "Energetic Data Security Management Scheme using Hybrid Encryption Algorithm over Cloud Environment." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (April 10, 2021): 201–8. http://dx.doi.org/10.17762/turcomat.v12i6.1289.

Full text
Abstract:
Now-a-days all documents are in a digital format as well as everyone need to maintain their data in electronic mode with the help of cloud servers. A cloud server provides lots of facilities to users such as remote data maintenance, huge data handling and so on. But in the case of security many cloud servers are providing probabilistic results alone. So, that a new cloud server data maintenance scheme is required to provide a high-level data security to the cloud system in an efficient manner. This paper introduces a new crypto-approach called Novel Hybrid Encryption Mode (NHEM), in which this algorithm integrates several latest approaches of crypto logics into it and provides a top-end security level to the cloud data. This NHEM is derived from the base factors of two cryptographic algorithms called Advanced Encryption Standard with 512-bit size of key frequency with Message Digest (MD5) algorithm. By using the integration of these two powerful approaches, a novel approach called NHEM is designed and it provides a huge support to preserve security on cloud medium. The cloud data needs to be protected from unwanted threats and intruders by means of raising an interruption attacks on server. The proposed approach of Novel Hybrid Encryption Mode concentrates more on access control logics and the crypto norms with respect to privacy measures. In this paper, the proposed scheme assures the data is too robust and no one can attack the data without proper credentials as well as the outcome proofs are clearly given on the resulting unit of this paper. The Advanced Encryption Standard algorithm is a well-known and powerful crypto scheme and the MD5 algorithm is also considered to be the unique unidirectional algorithm to provide security level in energetic manner. These two algorithms are combined together with the bit frequency of 512 to achieve the highest accuracy levels in data security over cloud environment as well as the resulting portion clearly illustrates that with proper graphical outcome.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Probabilistic data encryption"

1

Lincoln, Laura Beth. "Symmetric private information retrieval via additive homomorphic probabilistic encryption /." Online version of thesis, 2006. https://ritdml.rit.edu/dspace/handle/1850/2792.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Бейнер, Петр Сергеевич. "Информационно-измерительная система мониторинга температурного режима гидротехнических сооружений АЭС." Thesis, Национальный аэрокосмический университет им. Н. Е. Жуковского "Харьковский авиационный институт", 2016. http://repository.kpi.kharkov.ua/handle/KhPI-Press/24781.

Full text
Abstract:
Диссертация на соискание ученой степени кандидата технических наук по специальности 05.13.05 – Компьютерные системы и компоненты. – Национальный технический университет "Харьковский политехнический институт", Харьков 2016. Диссертация посвящена разработке информационно-измерительной системы (ИИС) мониторинга гидротермических параметров АЭС для решения научно-практической задачи оптимизации функционирования энергосистемы путем компьютерной обработки данных о состоянии ГТС с учетом метеорологических факторов и объективного прогноза температурного режима циркуляционной воды. Разработана ИИС гидрометеорологических параметров АЭС с усовершенствованной системой измерения, передачи, сбора, архивирования и анализа параметров, влияющих на температурный режим циркуляционной воды в ГТС АЭС. Предложенная структура для распределенной ИИС, которая разработана в соответствии с техническим регламентом безопасной эксплуатации энергоблоков АЭС, позволяет проводить качественный мониторинг гидротермических процессов в системе оборотного водоснабжения АЭС, что допускает использование полученной информации для принятия обоснованных, взвешенных решений при корректировках суточного диспетчерского графика нагрузок АЭС во время сезонных ограничений. Разработаны принципы формирования единой базы данных метеорологической и гидротермической информации в ГТС, которая позволяет не только выполнять системную обработку данных, но и использовать информацию для достоверного прогнозирования гидротермического режима циркуляционной воды, участвующей в системе оборотного водоснабжения АЭС. Впервые предложена методика создания энергоэффективной структуры беспроводной сенсорной сети (БСС), позволяющей дистанционно измерять физические величины, распределенные на больших расстояниях. Использование предложенной БСС обусловлено следующими преимуществами для водных объектов АЭС, участвующих в системе охлаждения воды: отсутствием необходимости в прокладке кабелей для электропитания и передачи данных; низкой стоимость монтажа, пуска-наладки и технического обслуживания системы; минимальными ограничениями по размещению беспроводных устройств; возможностью внедрения и модификации сети на эксплуатируемом объекте без вмешательства в процесс функционирования; надежность и отказоустойчивость всей системы в целом при нарушении отдельных соединений между узлами. Получил развитие метод передачи гидрометеорологических параметров в ИИС на АЭС путем использования вероятностного шифрования информации в каналах связи, что позволило повысить степень защиты измерительной информации от несанкционированного доступа, а также увеличить помехоустойчивость. Применение вероятностной формы представления информации, позволяет воспользоваться следующими преимуществами: малый аппаратный объем; возможность функционирования в масштабе реального времени; повышенная помехозащищенность; существенно увеличена сложность проведения атак на основе статистических закономерностей функций шифрования; возможность внести дополнительный параметр безопасности, управляя законом распределения случайных чисел, для формирования вероятностного отображения, позволяет увеличить время жизни ключа. Разработаны программно-аппаратные средства для ИИС гидротермических параметров ГТС АЭС в режиме реального времени на основе Web-технологий. Программный комплекс позволяет сократить сроки получения, обработки и анализа гидрометеорологических данных, повысить достоверность и качество получаемых результатов, а также обеспечить сохранность информации. Разработанная программа прошла регистрацию в Государственном департаменте интеллектуальной собственности Украины.
Thesis for scientific degree candidate of technical sciences in the specialty 05.13.05 – computer systems and components. – National Technical University "Kharkov Polytechnic Institute", Kharkov 2016. Dissertation is devoted to solving scientific and applied problems that concern the optimization of the NPP power system functioning. It is achieved by increasing monitoring accuracy of hydrothermal parameters at the hydrotechnical facilities taking into account hydrometeorological factors and the objective prediction of the circulating water temperature by means of the developed information-measurement system. The information-measurement system of the NPP hydrometeorological parameters was developed, with enhanced system of measurement, transfer, collection, backup, and analysis of parameters affecting the circulating water temperature at the NPP hydrotechnical facilities. Techniques to create energy-efficient structure of the wireless sensor networks were suggested, providing the remote measurement of the physical values extended over a large area of the NPP. The method of transferring hydrometeorological parameters within the information-measurement system was furthered, the probabilistic data encryption being used in the communication channels. It resulted in raising the security level of the measurement data against the unauthorized access and increasing the interference immunity.
APA, Harvard, Vancouver, ISO, and other styles
3

Бейнер, Петро Сергійович. "Інформаційно-вимірювальна система моніторингу температурного режиму гідротехнічних споруд АЕС." Thesis, НТУ "ХПІ", 2016. http://repository.kpi.kharkov.ua/handle/KhPI-Press/24773.

Full text
Abstract:
Дисертація на здобуття наукового ступеня кандидата технічних наук за спеціальністю 05.13.05 – Комп'ютерні системи та компоненти. – Національний технічний університет "Харківський політехнічний інститут", Харків 2016. Дисертаційна робота присвячена розробці інформаційно-вимірювальної системи (ІВС) моніторингу гідротермічних параметрів АЕС для вирішення науково-практичної задачі оптимізації функціонування енергосистеми шляхом комп’ютерної обробки даних про стан гідротехнічних споруд (ГТС) з урахуванням метеорологічних факторів і об'єктивного прогнозу температурного режиму циркуляційної води. Розроблено ІВС гідрометеорологічних параметрів АЕС з удосконаленою системою вимірювання, передачі, збору, архівування і аналізу параметрів, що впливають на температурний режим циркуляційної води в ГТС АЕС. Запропоновано методику створення енергоефективної структури бездротової сенсорної мережі, що дозволяє дистанційно вимірювати фізичних величин, розподілені на великих відстанях на АЕС. Отримав розвиток метод передачі гідрометеорологічних параметрів в ІВС на АЕС шляхом використання імовірнісного шифрування інформації в каналах зв'язку, що дозволило підвищити ступінь захисту вимірювальної інформації від несанкціонованого доступу, а також збільшити завадостійкість.
Thesis for scientific degree candidate of technical sciences in the specialty 05.13.05 – computer systems and components. – National Technical University "Kharkov Polytechnic Institute", Kharkov 2016. Dissertation is devoted to solving scientific and applied problems that concern the optimization of the NPP power system functioning. It is achieved by increasing monitoring accuracy of hydrothermal parameters at the hydrotechnical facilities taking into account hydrometeorological factors and the objective prediction of the circulating water temperature by means of the developed information-measurement system. The information-measurement system of the NPP hydrometeorological parameters was developed, with enhanced system of measurement, transfer, collection, backup, and analysis of parameters affecting the circulating water temperature at the NPP hydrotechnical facilities. Techniques to create energy-efficient structure of the wireless sensor networks were suggested, providing the remote measurement of the physical values extended over a large area of the NPP. The method of transferring hydrometeorological parameters within the information-measurement system was furthered, the probabilistic data encryption being used in the communication channels. It resulted in raising the security level of the measurement data against the unauthorized access and increasing the interference immunity.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Probabilistic data encryption"

1

Goldreich, Oded. Modern Cryptography, Probabilistic Proofs and Pseudorandomness. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Probabilistic data encryption"

1

Adi Narayana Reddy, K., V. Madhu Viswanatham, and B. Vishnu Vardhan. "An Enhanced Probabilistic Encryption Algorithm for Secured Data Transmission." In Communications in Computer and Information Science, 284–90. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29219-4_33.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kaduvu, Haripriya, V. Lavanya, and M. Saravanan. "Probabilistic Optimization of Incorporating Security Ciphers and Encryption of Data Storage in Cloud." In Artificial Intelligence Techniques for Advanced Computing Applications, 345–55. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5329-5_33.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

"Encryption Schemes for Anonymous Systems." In Anonymous Security Systems and Applications, 26–45. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-1649-3.ch004.

Full text
Abstract:
As encryption schemes useful in developing secure anonymous systems, linear equation based encryption, probabilistic, commutative and verifiable re-encryption, and threshold ElGamal encryption schemes are introduced. Linear equation based encryption functions are additive, and they enable entities to calculate sums of data owned by others without knowing individual values, and probabilistic, commutative and verifiable re-encryption functions enable entities to encrypt data while concealing the correspondences between encrypted data and their decrypted forms from anyone including the owners of the data. Finally, threshold ElGamal encryption functions disable entities to decrypt encrypted data without the cooperation among t out of n authorities (t = n), while ensuring correct decryptions when at least t authorities are honest. All encryption schemes are extensively used in the following parts of this book, e.g. for developing anonymous communication systems, anonymous authentication systems, electronic payment, procurement, and voting systems.
APA, Harvard, Vancouver, ISO, and other styles
4

Krishna, Addepalli V. N., and Balamurugan M. "Security Mechanisms in Cloud Computing-Based Big Data." In Advances in Wireless Technologies and Telecommunication, 165–95. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7335-7.ch009.

Full text
Abstract:
In the existent system, data is encrypted and stored when passed to the cloud. During any operations on the data, it is decrypted and then the computation is done. This decrypted data is vulnerable and prone to be misused. After the computations are done, the data and the result are encrypted and stored back in the cloud. This creates an overhead to the system as well as increases time complexity. With this chapter, the authors aim to reduce the overhead of the systems to perform repeated encryptions and decryptions. This can be done by allowing the computations to happen directly on the encrypted text. The result obtained by performing computations on encrypted data will be the same as the ones done on the original plain text. This new security solution is fully fit for processing and retrieval of encrypted data, effectively leading to the broad applicable project, the security of data transmission, and the storage of data. The work is secured further with additional concepts like probabilistic and time stamp-based encryption processes.
APA, Harvard, Vancouver, ISO, and other styles
5

Krishna, Addepalli V. N., and Balamurugan M. "Security Mechanisms in Cloud Computing-Based Big Data." In Research Anthology on Artificial Intelligence Applications in Security, 694–724. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7705-9.ch032.

Full text
Abstract:
In the existent system, data is encrypted and stored when passed to the cloud. During any operations on the data, it is decrypted and then the computation is done. This decrypted data is vulnerable and prone to be misused. After the computations are done, the data and the result are encrypted and stored back in the cloud. This creates an overhead to the system as well as increases time complexity. With this chapter, the authors aim to reduce the overhead of the systems to perform repeated encryptions and decryptions. This can be done by allowing the computations to happen directly on the encrypted text. The result obtained by performing computations on encrypted data will be the same as the ones done on the original plain text. This new security solution is fully fit for processing and retrieval of encrypted data, effectively leading to the broad applicable project, the security of data transmission, and the storage of data. The work is secured further with additional concepts like probabilistic and time stamp-based encryption processes.
APA, Harvard, Vancouver, ISO, and other styles
6

Krishna, Addepalli V. N., and Balamurugan M. "Security Mechanisms in Cloud Computing-Based Big Data." In Research Anthology on Blockchain Technology in Business, Healthcare, Education, and Government, 897–926. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-5351-0.ch052.

Full text
Abstract:
In the existent system, data is encrypted and stored when passed to the cloud. During any operations on the data, it is decrypted and then the computation is done. This decrypted data is vulnerable and prone to be misused. After the computations are done, the data and the result are encrypted and stored back in the cloud. This creates an overhead to the system as well as increases time complexity. With this chapter, the authors aim to reduce the overhead of the systems to perform repeated encryptions and decryptions. This can be done by allowing the computations to happen directly on the encrypted text. The result obtained by performing computations on encrypted data will be the same as the ones done on the original plain text. This new security solution is fully fit for processing and retrieval of encrypted data, effectively leading to the broad applicable project, the security of data transmission, and the storage of data. The work is secured further with additional concepts like probabilistic and time stamp-based encryption processes.
APA, Harvard, Vancouver, ISO, and other styles
7

Krishna, Addepalli V. N., and Balamurugan M. "Security Mechanisms in Cloud Computing-Based Big Data." In Research Anthology on Artificial Intelligence Applications in Security, 694–724. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7705-9.ch032.

Full text
Abstract:
In the existent system, data is encrypted and stored when passed to the cloud. During any operations on the data, it is decrypted and then the computation is done. This decrypted data is vulnerable and prone to be misused. After the computations are done, the data and the result are encrypted and stored back in the cloud. This creates an overhead to the system as well as increases time complexity. With this chapter, the authors aim to reduce the overhead of the systems to perform repeated encryptions and decryptions. This can be done by allowing the computations to happen directly on the encrypted text. The result obtained by performing computations on encrypted data will be the same as the ones done on the original plain text. This new security solution is fully fit for processing and retrieval of encrypted data, effectively leading to the broad applicable project, the security of data transmission, and the storage of data. The work is secured further with additional concepts like probabilistic and time stamp-based encryption processes.
APA, Harvard, Vancouver, ISO, and other styles
8

N., Jayapandian. "Industry 4.0 Privacy and Security Protocol Issues in Internet of Things." In IoT Architectures, Models, and Platforms for Smart City Applications, 193–217. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-1253-1.ch010.

Full text
Abstract:
The main objectives of this chapter are to discuss the basics of IoT and its applications and to solve data security and privacy issues in Industry 4.0. Industry 4.0 is mainly focus on IoT technology. The IIoT is generating digital data, and that data is stored in cloud server. There are two major issues in this IIoT. The first one is data storage, and the second one is data security. Industry 4.0 is not only involved in the manufacturing industry. It is also in the transportation and automobile industries. Electrical, electronic, mechanical, and computer technology fields are involved in Industry 4.0. This chapter enhances the hybrid security protocol in Industrial IoT. This hybrid mechanism combines lightweight protocol and the probabilistic encryption (LPP) algorithm.
APA, Harvard, Vancouver, ISO, and other styles
9

N., Jayapandian. "Industry 4.0 Privacy and Security Protocol Issues in Internet of Things." In Research Anthology on Cross-Industry Challenges of Industry 4.0, 1853–76. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-8548-1.ch094.

Full text
Abstract:
The main objectives of this chapter are to discuss the basics of IoT and its applications and to solve data security and privacy issues in Industry 4.0. Industry 4.0 is mainly focus on IoT technology. The IIoT is generating digital data, and that data is stored in cloud server. There are two major issues in this IIoT. The first one is data storage, and the second one is data security. Industry 4.0 is not only involved in the manufacturing industry. It is also in the transportation and automobile industries. Electrical, electronic, mechanical, and computer technology fields are involved in Industry 4.0. This chapter enhances the hybrid security protocol in Industrial IoT. This hybrid mechanism combines lightweight protocol and the probabilistic encryption (LPP) algorithm.
APA, Harvard, Vancouver, ISO, and other styles
10

Krishna, A. V. N. "A Randomized Cloud Library Security Environment." In Cloud Security, 1087–107. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8176-5.ch056.

Full text
Abstract:
Cloud computing is leading the technology development of today's communication scenario. This is because of its cost-efficiency and flexibility. In Cloud computing vast amounts of data are stored in varied and distributed environments, and security to data is of prime concern. RSA or Elliptic Curve Cryptography (ECC) provides a secure means of message transmission among communicating hosts using Diffie Hellman Key Exchange algorithm or ElGamal algorithm. By having key lengths of 160 bits, the ECC algorithm provides sufficient strength against crypto analysis and its performance can be compared with standard algorithms like RSA with a bit length of 1024 bits. In the present work, the plain text is converted to cipher text using RSA or ECC algorithms. As the proposed model is intended to be used in Cloud environment, a probabilistic mathematical model is also used. While the data is being retrieved from the servers, a query is being used which uses the mathematical model to search for the data which is still in encryption form. Final decryption takes place only at user's site by using the private keys. Thus the security model provides the fundamental security services like Authentication, Security, and Confidentiality to the transmitted message and also provides sufficient strength against crypto analysis in Cloud environment.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Probabilistic data encryption"

1

Singh, Binay Kumar, Abusha Tsegaye, and Jagat Singh. "Probabilistic data encryption using elliptic curve cryptography and Arnold transformation." In 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC). IEEE, 2017. http://dx.doi.org/10.1109/i-smac.2017.8058259.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Samanthula, Bharath K., Wei Jiang, and Sanjay Madria. "A Probabilistic Encryption Based MIN/MAX Computation in Wireless Sensor Networks." In 2013 14th IEEE International Conference on Mobile Data Management (MDM). IEEE, 2013. http://dx.doi.org/10.1109/mdm.2013.18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Yeh, Jyh-Haw. "A Probabilistic Homomorphic Encryption Algorithm over Integers - Protecting Data Privacy in Clouds." In 2015 IEEE 12th Intl. Conf. on Ubiquitous Intelligence and Computing, 2015 IEEE 12th Intl. Conf. on Autonomic and Trusted Computing and 2015 IEEE 15th Intl. Conf. on Scalable Computing and Communications and its Associated Workshops (UIC-ATC-ScalCom). IEEE, 2015. http://dx.doi.org/10.1109/uic-atc-scalcom-cbdcom-iop.2015.130.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography