Literatura académica sobre el tema "Advanced cryptographic techniques"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Advanced cryptographic techniques".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Advanced cryptographic techniques"
Abudalou, Mohammad. "Enhancing Data Security through Advanced Cryptographic Techniques." International Journal of Computer Science and Mobile Computing 13, no. 1 (2024): 88–92. http://dx.doi.org/10.47760/ijcsmc.2024.v13i01.007.
Texto completoKarantjias, Athanasios, and Nineta Polemi. "Assessment of advanced cryptographic antiviral techniques." International Journal of Electronic Security and Digital Forensics 3, no. 1 (2010): 60. http://dx.doi.org/10.1504/ijesdf.2010.032331.
Texto completoViresh, Kasheenath Babaleshwar, Karade Sinchana, N. Sakshi, and Naidu Anush. "Audio encryption and decryption using AES algorithm technique." i-manager’s Journal on Electronics Engineering 14, no. 2 (2024): 8. http://dx.doi.org/10.26634/jele.14.2.20486.
Texto completoLewis, Nehama, Yaron Connelly, Gil Henkin, Max Leibovich, and Adi Akavia. "Factors Influencing the Adoption of Advanced Cryptographic Techniques for Data Protection of Patient Medical Records." Healthcare Informatics Research 28, no. 2 (2022): 132–42. http://dx.doi.org/10.4258/hir.2022.28.2.132.
Texto completoHieu, Phan Duong, and Moti Yung. "PRIVACY IN ADVANCED CRYPTOGRAPHIC PROTOCOLS: PROTOTYPICAL EXAMPLES." Journal of Computer Science and Cybernetics 37, no. 4 (2021): 429–51. http://dx.doi.org/10.15625/1813-9663/37/4/16104.
Texto completoMalhotra, Anoushka, Ashwin Arora, and Dr Manjot Kaur Bhatia. "Symmetric Cryptographic Approaches." International Journal for Research in Applied Science and Engineering Technology 10, no. 12 (2022): 718–21. http://dx.doi.org/10.22214/ijraset.2022.47982.
Texto completoSingh, Sukhveer. "Investigation of Cryptography for Secure Communication and Data Privacy Applications." Mathematical Statistician and Engineering Applications 70, no. 1 (2021): 551–60. http://dx.doi.org/10.17762/msea.v70i1.2508.
Texto completoMark Espalmado, John, and Edwin Arboleda. "DARE Algorithm: A New Security Protocol by Integration of Different Cryptographic Techniques." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 2 (2017): 1032. http://dx.doi.org/10.11591/ijece.v7i2.pp1032-1041.
Texto completoFeilu Hang, Et al. "Design Of Intelligent Countermeasure System for Power System Network Security Defense." Journal of Electrical Systems 19, no. 4 (2024): 227–40. http://dx.doi.org/10.52783/jes.635.
Texto completoParthasarathy, Rajamohan, Seow Soon Loong, and Preethy Ayyappan. "An Efficient Encryption Implementation Using AES Algorithm Techniques." Journal of Engineering & Technological Advances 3, no. 1 (2018): 61–70. http://dx.doi.org/10.35934/segi.v3i1.61.
Texto completoTesis sobre el tema "Advanced cryptographic techniques"
Ibarrondo, Luis Alberto. "Privacy-preserving biometric recognition systems with advanced cryptographic techniques." Electronic Thesis or Diss., Sorbonne université, 2023. https://theses.hal.science/tel-04058954.
Texto completoEscala, Ribas Alex. "Advanced cryptographic techniques for building verifiable and transparent electronic voting protocols." Doctoral thesis, Universitat Politècnica de Catalunya, 2017. http://hdl.handle.net/10803/457585.
Texto completoHartung, Gunnar Richard [Verfasser], and J. [Akademischer Betreuer] Müller-Quade. "Advanced Cryptographic Techniques for Protecting Log Data / Gunnar Richard Hartung ; Betreuer: J. Müller-Quade." Karlsruhe : KIT-Bibliothek, 2020. http://d-nb.info/1206646683/34.
Texto completoSantiago, Pinazo Sonia. "Advanced Features in Protocol Verification: Theory, Properties, and Efficiency in Maude-NPA." Doctoral thesis, Universitat Politècnica de València, 2015. http://hdl.handle.net/10251/48527.
Texto completoBozdemir, Beyza. "Privacy-preserving machine learning techniques." Electronic Thesis or Diss., Sorbonne université, 2021. http://www.theses.fr/2021SORUS323.
Texto completoCapraro, Ivan. "Advanced Techniques in Free Space Quantum Communication." Doctoral thesis, Università degli studi di Padova, 2008. http://hdl.handle.net/11577/3425561.
Texto completoLibros sobre el tema "Advanced cryptographic techniques"
Swenson, Christopher. Modern cryptanalysis: Techniques for advanced code breaking. Wiley Pub., 2008.
Buscar texto completo1949-, Beth Thomas, Cot N. 1945-, and Ingemarsson I. 1938-, eds. Advances in cryptology: Proceedings of EUROCRYPT 84, a Workshop on the Theory and Application of Cryptographic Techniques, Paris, France, April 9-11, 1984. Springer-Verlag, 1985.
Buscar texto completoChristian, Cachin, and Camenisch Jan, eds. Advances in cryptology: EUROCRYPT 2004 : International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004 : proceedings. Springer, 2004.
Buscar texto completoEUROCRYPT '94 (1994 Perugia, Italy). Advances in cryptology--EUROCRYPT-94: Workshop on the Theory and Application of Cryptographic Techniques, Perugia, Italy, May 9-12, 1994 : proceedings. Springer-Verlag, 1995.
Buscar texto completo1945-, Quisquater J. J., and Guillou Louis C. 1947-, eds. Advances in cryptology, EUROCRYPT '95: International Conference on the Theory and Application of Cryptographic Techniques, Saint-Malo, France, May 21-25, 1995 : proceedings. Springer, 1995.
Buscar texto completoWatts, Davies Donald, ed. Advances in cryptology--EUROCRYPT '91: Workshop on the Theory and Application of Cryptographic Techniques, Brighton, UK, April 8-11, 1991 : proceedings. Springer-Verlag, 1991.
Buscar texto completoEUROCRYPT, '88 (1988 Davos Switzerland). Advances in cryptology--EUROCRYPT '88: Workshop on the Theory and Application of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988 : proceedings. Springer-Verlag, 1988.
Buscar texto completoEUROCRYPT '92 (1992 Balatonfüred, Hungary). Advances in cryptology--EUROCRYPT '92: Workshop on the Theory and Application of Cryptographic Techniques, Balatonfüred, Hungary, May 24-28, 1992 : proceedings. Springer-Verlag, 1993.
Buscar texto completoAUSCRYPT '92 (1992 Gold Coast, Queensland, Australia). Advances in cryptology-AUSCRYPT '92: Workshop on the theory and application of cryptographic techniques, Gold Coast, Queensland, Australia, December 13-16, 1992, proceedings. Springer-Verlag, 1993.
Buscar texto completoEUROCRYPT '96 (1996 Zaragoza, Spain). Advances in cryptology, EUROCRYPT '96: International Conference on the Theory and Application of Cryptographic Techniques, Saragossa, Spain, May 12-16, 1996 : proceedings. Springer, 1996.
Buscar texto completoCapítulos de libros sobre el tema "Advanced cryptographic techniques"
Kumar, J. Pradeep, P. Neelakanta Rao, and Neeraja koppula. "Secure Data Sharing in Images Using Cryptographic Approach." In Advanced Techniques for IoT Applications. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-4435-1_34.
Texto completoGoh, Alwyn, and David C. L. Ngo. "Computation of Cryptographic Keys from Face Biometrics." In Communications and Multimedia Security. Advanced Techniques for Network and Data Protection. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-45184-6_1.
Texto completoMohanta, Kshitish Kumar, Deena Sunil Sharanappa, and Vishnu Narayan Mishra. "Enhancing the security of public key cryptographic model based on integrated ElGamal-Elliptic Curve Diffe Hellman (EG-ECDH) key exchange technique." In Advanced Mathematical Techniques in Computational and Intelligent Systems. CRC Press, 2023. http://dx.doi.org/10.1201/9781003460169-6.
Texto completoLenin Solomon, A., and Narendran Rajagopalan. "Performance Analysis of Various Cryptographic Techniques." In Advances in Automation, Signal Processing, Instrumentation, and Control. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-15-8221-9_156.
Texto completoSrivastava, Ananya, Aboli Khare, Priyaranjan Satapathy, and Ayes Chinmay. "Investigating Various Cryptographic Techniques Used in Cloud Computing." In Advances in Data Science and Management. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-0978-0_26.
Texto completoArun, V., D. Laxma Reddy, and K. Nishanth Rao. "A Novel Analysis of Efficient Energy Architecture in Cryptography." In Advanced Techniques for IoT Applications. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-4435-1_32.
Texto completoBasavaiah, Jagadeesh, Audre Arlene Anthony, and Chandrashekar Mohan Patil. "Visual Cryptography Using Hill Cipher and Advanced Hill Cipher Techniques." In Advances in VLSI, Signal Processing, Power Electronics, IoT, Communication and Embedded Systems. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-0443-0_34.
Texto completoSheikh, Shafiya Afzal, and M. Tariq Banday. "Secure E-mail Communications Through Cryptographic Techniques—A Study." In Advances in Intelligent Systems and Computing. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-1275-9_19.
Texto completoFischer, Michael, and Rebecca Wright. "An application of game theoretic techniques to cryptography." In Advances in Computational Complexity Theory. American Mathematical Society, 1993. http://dx.doi.org/10.1090/dimacs/013/06.
Texto completoSathya Priya, J., V. Krithikaa, S. Monika, and P. Nivethini. "Ensuring Security in Sharing of Information Using Cryptographic Technique." In Advances in Intelligent Systems and Computing. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-2182-5_3.
Texto completoActas de conferencias sobre el tema "Advanced cryptographic techniques"
Ogiela, Marek R., Lidia Ogiela, and Urszula Ogiela. "Cryptographic Techniques in Advanced Information Management." In 2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS). IEEE, 2014. http://dx.doi.org/10.1109/imis.2014.31.
Texto completoOo, Bo Bo, and May Thu Aung. "Enhancing Secure Digital Communication Media Using Cryptographic Steganography Techniques." In 2020 International Conference on Advanced Information Technologies (ICAIT). IEEE, 2020. http://dx.doi.org/10.1109/icait51105.2020.9261790.
Texto completoOgiela, Lidia, and Marek R. Ogiela. "Bio-Inspired Cryptographic Techniques in Information Management Applications." In 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA). IEEE, 2016. http://dx.doi.org/10.1109/aina.2016.161.
Texto completoMihaljevic, Miodrag, Hideki Imai, Michael David, Kazukuni Kobara, and Hajime Watanabe. "On advanced cryptographic techniques for information security of smart grid AMI." In the Seventh Annual Workshop. ACM Press, 2011. http://dx.doi.org/10.1145/2179298.2179371.
Texto completoFaz-Hernández, Armando, and Julio López. "High-Performance Elliptic Curve Cryptography: A SIMD Approach to Modern Curves." In Concurso de Teses e Dissertações. Sociedade Brasileira de Computação - SBC, 2023. http://dx.doi.org/10.5753/ctd.2023.230156.
Texto completoKumar, Vishal, Shafaque Ahmareen, Manoj Kumar, Yogendra Narayan Prajapati, Bhasker Pant, and Sneha Bohra. "Enhancing OTP Generation Efficiency through Cryptographic Techniques." In 2023 3rd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE). IEEE, 2023. http://dx.doi.org/10.1109/icacite57410.2023.10182488.
Texto completoPateriya, Pushpendra Kumar, Mritunjay Rai, Krishna Prasad Mukherjee, and Gaurav Raj. "A Lightweight Cryptographic Algorithm using Trigonometric Technique." In 2018 International Conference on Advances in Computing and Communication Engineering (ICACCE). IEEE, 2018. http://dx.doi.org/10.1109/icacce.2018.8441670.
Texto completoSomaschi, Niccolo. "Semiconductor quantum dot based single-photon sources as resources for quantum communication and cryptography applications." In Advanced Photon Counting Techniques XVI, edited by Mark A. Itzler, K. Alex McIntosh, and Joshua C. Bienfang. SPIE, 2022. http://dx.doi.org/10.1117/12.2618464.
Texto completoHill, Alexander D., Bradley Christensen, and Paul G. Kwiat. "Advanced techniques for free-space optical quantum cryptography over water." In SPIE LASE, edited by Hamid Hemmati and Don M. Boroson. SPIE, 2016. http://dx.doi.org/10.1117/12.2218270.
Texto completoVaibhavi, Aher, and Kulkarni Samidha. "Cryptography Technique for Data Hiding Application." In 2016 Sixth International Conference on Advanced Computing & Communication Technologies. Research Publishing Services, 2016. http://dx.doi.org/10.3850/978-981-11-0783-2_420.
Texto completo