Journal articles on the topic 'Probabilistic data encryption'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 27 journal articles for your research on the topic 'Probabilistic data encryption.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Mazumder, Rashed, Atsuko Miyaji, and Chunhua Su. "Probably Secure Keyed-Function Based Authenticated Encryption Schemes for Big Data." International Journal of Foundations of Computer Science 28, no. 06 (September 2017): 661–82. http://dx.doi.org/10.1142/s0129054117400123.
Full textLeung, K. C., S. L. Li, L. M. Cheng, and C. K. Chan. "A Symmetric Probabilistic Encryption Scheme Based On CHNN Without Data Expansion." Neural Processing Letters 24, no. 2 (September 20, 2006): 93–105. http://dx.doi.org/10.1007/s11063-006-9006-9.
Full textAruna, M. G., and K. G. Mohan. "Secured cloud data migration technique by competent probabilistic public key encryption." China Communications 17, no. 5 (May 2020): 168–90. http://dx.doi.org/10.23919/jcc.2020.05.014.
Full textKulshrestha, Vartika, Seema Verma, and C. Rama Krishna. "Hybrid probabilistic triple encryption approach for data security in cloud computing." International Journal of Advanced Intelligence Paradigms 21, no. 1/2 (2022): 158. http://dx.doi.org/10.1504/ijaip.2022.121035.
Full textZhu, Li Juan. "A Network Identity Authentication Protocol Based on Fingerprint and Probabilistic Encryption of RSA." Applied Mechanics and Materials 241-244 (December 2012): 2471–74. http://dx.doi.org/10.4028/www.scientific.net/amm.241-244.2471.
Full textKulshrestha, Vartika, Seema Verma, and C. Rama Krishna. "Hybrid Probabilistic Triple Encryption (HPRRA) Approach for Data Security in Cloud Computing." International Journal of Advanced Intelligence Paradigms 1, no. 1 (2021): 1. http://dx.doi.org/10.1504/ijaip.2021.10036005.
Full textLuna, Jose Marcio, Chaouki T. Abdallah, and Gregory L. Heileman. "Probabilistic Optimization of Resource Distribution and Encryption for Data Storage in the Cloud." IEEE Transactions on Cloud Computing 6, no. 2 (April 1, 2018): 428–39. http://dx.doi.org/10.1109/tcc.2016.2543728.
Full textZhang, Jing-Wen, Xiu-Bo Chen, Gang Xu, and Yi-Xian Yang. "Universal quantum circuit evaluation on encrypted data using probabilistic quantum homomorphic encryption scheme*." Chinese Physics B 30, no. 7 (July 1, 2021): 070309. http://dx.doi.org/10.1088/1674-1056/ac003b.
Full textGandhi, Mehak, and Kiranbir Kaur. "Enhancing Secure and Efficient Online Data Storage over Cloud Using Homomorphic with Probabilistic Encryption." International Journal of Computer Sciences and Engineering 6, no. 3 (March 30, 2018): 263–68. http://dx.doi.org/10.26438/ijcse/v6i3.263268.
Full textEt.al, Quazi Warisha Ahmed. "Energetic Data Security Management Scheme using Hybrid Encryption Algorithm over Cloud Environment." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (April 10, 2021): 201–8. http://dx.doi.org/10.17762/turcomat.v12i6.1289.
Full textJayapandian, N., and A. M. J. Md Zubair Rahman. "Secure and efficient online data storage and sharing over cloud environment using probabilistic with homomorphic encryption." Cluster Computing 20, no. 2 (March 29, 2017): 1561–73. http://dx.doi.org/10.1007/s10586-017-0809-4.
Full textWei, Hong Ru, and Ya Fei Zheng. "Algebraic Techniques in Linear Cryptanalysis." Advanced Materials Research 756-759 (September 2013): 3634–39. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.3634.
Full textSenthil Kumar, K., and D. Malathi. "A Novel method to represent Access Tree structure by Context Free Grammar with and-or graph in Key Policy based Attribute based Encryption." International Journal of Engineering & Technology 7, no. 4.10 (October 2, 2018): 396. http://dx.doi.org/10.14419/ijet.v7i4.10.20946.
Full textPrakash, A. John, and B. Lydia Elizabeth. "Pindex: Private multi-linked index for encrypted document retrieval." PLOS ONE 16, no. 8 (August 20, 2021): e0256223. http://dx.doi.org/10.1371/journal.pone.0256223.
Full textDadheech, Pankaj, Abolfazl Mehbodniya, Shivam Tiwari, Sarvesh Kumar, Pooja Singh, Sweta Gupta, and Henry kwame Atiglah. "Zika Virus Prediction Using AI-Driven Technology and Hybrid Optimization Algorithm in Healthcare." Journal of Healthcare Engineering 2022 (January 12, 2022): 1–13. http://dx.doi.org/10.1155/2022/2793850.
Full textYu, Yun William, and Griffin M. Weber. "Balancing Accuracy and Privacy in Federated Queries of Clinical Data Repositories: Algorithm Development and Validation." Journal of Medical Internet Research 22, no. 11 (November 3, 2020): e18735. http://dx.doi.org/10.2196/18735.
Full textKjamilji, Artrim. "Techniques and Challenges while Applying Machine Learning Algorithms in Privacy Preserving Fashion." Proceeding International Conference on Science and Engineering 3 (April 30, 2020): xix. http://dx.doi.org/10.14421/icse.v3.600.
Full text"Identity Based Data Sharing and Profile Matching using Probabilistic Key in Cloud." International Journal of Recent Technology and Engineering 8, no. 6 (March 30, 2020): 3076–80. http://dx.doi.org/10.35940/ijrte.f8434.038620.
Full text"A Symmetric Searchable Encryption Identification of Data on Probabilistic Trapdoors." International Journal of Engineering and Advanced Technology 9, no. 3 (February 29, 2020): 3880–83. http://dx.doi.org/10.35940/ijeat.c6389.029320.
Full textNagnath, Ingale Ashwini. "A Modified Approach on Security Analysis Using Probabilistic Order Preserving Encryption Based on Cloud Data Serach." International Journal Of Engineering And Computer Science, January 30, 2017. http://dx.doi.org/10.18535/ijecs/v6i1.58.
Full text"Enhanced Security of Encrypted Text by KDMT: Key-Domain Maximization Technique." International Journal of Recent Technology and Engineering 8, no. 5 (January 30, 2020): 1385–88. http://dx.doi.org/10.35940/ijrte.e6326.018520.
Full textJalasri, M., and L. Lakshmanan. "Managing data security in fog computing in IoT devices using noise framework encryption with power probabilistic clustering algorithm." Cluster Computing, May 17, 2022. http://dx.doi.org/10.1007/s10586-022-03606-2.
Full textThurairasu, Lisa, and Nelson Chong. "Information Management at a Health Services Research Organization in Toronto, Ontario, Canada: Moving from Identifiable Data to Coded Data." International Journal of Population Data Science 1, no. 1 (April 19, 2017). http://dx.doi.org/10.23889/ijpds.v1i1.307.
Full textAnwarbasha, H., S. Sasi Kumar, and D. Dhanasekaran. "An efficient and secure protocol for checking remote data integrity in multi-cloud environment." Scientific Reports 11, no. 1 (July 2, 2021). http://dx.doi.org/10.1038/s41598-021-93073-3.
Full textDerler, David, Kai Gellert, Tibor Jager, Daniel Slamanig, and Christoph Striecks. "Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange." Journal of Cryptology 34, no. 2 (March 9, 2021). http://dx.doi.org/10.1007/s00145-021-09374-3.
Full textLiu, Yiming, Qi Zeng, Yue Zhao, Kaijun Wu, and Yao Hao. "Novel channel-hopping pattern-based wireless IoT networks in smart cities for reducing multi-access interference and jamming attacks." EURASIP Journal on Wireless Communications and Networking 2021, no. 1 (July 13, 2021). http://dx.doi.org/10.1186/s13638-021-02029-8.
Full textSchnell, Rainer, and Christian Borgs. "Proof of Concept for a Privacy Preserving National Mortality Register." International Journal of Population Data Science 3, no. 4 (August 29, 2018). http://dx.doi.org/10.23889/ijpds.v3i4.732.
Full text