Artículos de revistas sobre el tema "Advanced cryptographic techniques"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Advanced cryptographic techniques".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Abudalou, Mohammad. "Enhancing Data Security through Advanced Cryptographic Techniques". International Journal of Computer Science and Mobile Computing 13, n.º 1 (30 de enero de 2024): 88–92. http://dx.doi.org/10.47760/ijcsmc.2024.v13i01.007.
Texto completoKarantjias, Athanasios y Nineta Polemi. "Assessment of advanced cryptographic antiviral techniques". International Journal of Electronic Security and Digital Forensics 3, n.º 1 (2010): 60. http://dx.doi.org/10.1504/ijesdf.2010.032331.
Texto completoViresh, Kasheenath Babaleshwar, Karade Sinchana, N. Sakshi y Naidu Anush. "Audio encryption and decryption using AES algorithm technique". i-manager’s Journal on Electronics Engineering 14, n.º 2 (2024): 8. http://dx.doi.org/10.26634/jele.14.2.20486.
Texto completoLewis, Nehama, Yaron Connelly, Gil Henkin, Max Leibovich y Adi Akavia. "Factors Influencing the Adoption of Advanced Cryptographic Techniques for Data Protection of Patient Medical Records". Healthcare Informatics Research 28, n.º 2 (30 de abril de 2022): 132–42. http://dx.doi.org/10.4258/hir.2022.28.2.132.
Texto completoHieu, Phan Duong y Moti Yung. "PRIVACY IN ADVANCED CRYPTOGRAPHIC PROTOCOLS: PROTOTYPICAL EXAMPLES". Journal of Computer Science and Cybernetics 37, n.º 4 (12 de octubre de 2021): 429–51. http://dx.doi.org/10.15625/1813-9663/37/4/16104.
Texto completoMalhotra, Anoushka, Ashwin Arora y Dr Manjot Kaur Bhatia. "Symmetric Cryptographic Approaches". International Journal for Research in Applied Science and Engineering Technology 10, n.º 12 (31 de diciembre de 2022): 718–21. http://dx.doi.org/10.22214/ijraset.2022.47982.
Texto completoSingh, Sukhveer. "Investigation of Cryptography for Secure Communication and Data Privacy Applications". Mathematical Statistician and Engineering Applications 70, n.º 1 (31 de enero de 2021): 551–60. http://dx.doi.org/10.17762/msea.v70i1.2508.
Texto completoMark Espalmado, John y Edwin Arboleda. "DARE Algorithm: A New Security Protocol by Integration of Different Cryptographic Techniques". International Journal of Electrical and Computer Engineering (IJECE) 7, n.º 2 (1 de abril de 2017): 1032. http://dx.doi.org/10.11591/ijece.v7i2.pp1032-1041.
Texto completoFeilu Hang, Et al. "Design Of Intelligent Countermeasure System for Power System Network Security Defense". Journal of Electrical Systems 19, n.º 4 (25 de enero de 2024): 227–40. http://dx.doi.org/10.52783/jes.635.
Texto completoParthasarathy, Rajamohan, Seow Soon Loong y Preethy Ayyappan. "An Efficient Encryption Implementation Using AES Algorithm Techniques". Journal of Engineering & Technological Advances 3, n.º 1 (2018): 61–70. http://dx.doi.org/10.35934/segi.v3i1.61.
Texto completoR, Mr Suresh. "A Survey on Quantum-Cryptographic Image Encryption for Secure Storage". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, n.º 04 (3 de abril de 2024): 1–5. http://dx.doi.org/10.55041/ijsrem29461.
Texto completoSundararajan, Ananiah Durai Durai y Rajashree R. "A Comprehensive Survey on Lightweight Asymmetric Key Cryptographic Algorithm for Resource Constrained Devices". ECS Transactions 107, n.º 1 (24 de abril de 2022): 7457–68. http://dx.doi.org/10.1149/10701.7457ecst.
Texto completoAnkita Srivastava. "Performance Evaluation of Genetic Algorithm-Driven Blockchain Encryption for EHR Management and Validation". Journal of Electrical Systems 20, n.º 7s (4 de mayo de 2024): 1726–39. http://dx.doi.org/10.52783/jes.3773.
Texto completoSultan, Abid, Yao Lin y Azhar Mushtaq. "A Survey Paper on ASCII-Based Cryptographic Techniques". Vol 4 Issue 4 4, n.º 4 (17 de diciembre de 2022): 1087–98. http://dx.doi.org/10.33411/ijist/2022040411.
Texto completoWaheed, Adil, Fazli Subhan, Mazliham Mohd Suud, Muhammad Yasir Hayat Malik, Alina Mirza y Farkhanda Afzal. "Construction of nonlinear component of block cipher using coset graph". AIMS Mathematics 8, n.º 9 (2023): 21644–67. http://dx.doi.org/10.3934/math.20231104.
Texto completoAbdElminaam, DiaaSalama, Hatem M. Abdul Kader, Mohie M. Hadhoud y Salah M. El-Sayed. "Developing and Evaluation of New Hybrid Encryption Algorithms". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 13, n.º 1 (28 de marzo de 2014): 4038–52. http://dx.doi.org/10.24297/ijct.v13i1.2926.
Texto completoParenreng, Jumadi Mabe, Sahraeni Maulida Mustari y Abdul Wahid. "E-mail Security System Using El-Gamal Hybrid Algorithm and AES (Advanced Encryption Standard) Algorithm". Internet of Things and Artificial Intelligence Journal 2, n.º 1 (16 de febrero de 2022): 1–9. http://dx.doi.org/10.31763/iota.v2i1.510.
Texto completoSai D, Jagadeesh y Krishnaraj P M. "Cryptographic Interweaving of Messages". International Journal of Data Informatics and Intelligent Computing 2, n.º 1 (24 de marzo de 2023): 42–50. http://dx.doi.org/10.59461/ijdiic.v2i1.38.
Texto completoLimniotis, Konstantinos. "Cryptography as the Means to Protect Fundamental Human Rights". Cryptography 5, n.º 4 (30 de noviembre de 2021): 34. http://dx.doi.org/10.3390/cryptography5040034.
Texto completoKumar, Dilip y Manoj Kumar. "Hybrid Cryptographic Approach for Data Security Using Elliptic Curve Cryptography for IoT". International Journal of Computer Network and Information Security 16, n.º 2 (8 de abril de 2024): 42–54. http://dx.doi.org/10.5815/ijcnis.2024.02.04.
Texto completoGowda, V. Dankan, D. Palanikkumar, Sajja Suneel, Satish Dekka, T. Thiruvenkadam y K. D. V. Prasad. "Cryptographic image-based data security strategies in wireless sensor networks". Journal of Discrete Mathematical Sciences and Cryptography 27, n.º 2 (2024): 293–304. http://dx.doi.org/10.47974/jdmsc-1883.
Texto completoShah, Aayush, Prabhat Mahato y Aadarsh Bhagat. "Enhancing Post-Quantum Cryptography: Exploring Mathematical Foundations and Comparative Analysis of Different Cryptographic Algorithm". International Journal for Research in Applied Science and Engineering Technology 11, n.º 8 (31 de agosto de 2023): 1626–42. http://dx.doi.org/10.22214/ijraset.2023.55341.
Texto completoLiang, Yuheng. "A research on applications of neural network-based cryptography". Applied and Computational Engineering 14, n.º 1 (23 de octubre de 2023): 258–64. http://dx.doi.org/10.54254/2755-2721/14/20230798.
Texto completoAdy Putra, Wahyu, Suyanto Suyanto y Muhammad Zarlis. "Performance Analysis Of The Combination Of Advanced Encryption Standard Cryptography Algorithms With Luc For Text Security". SinkrOn 8, n.º 2 (6 de abril de 2023): 890–97. http://dx.doi.org/10.33395/sinkron.v8i2.12202.
Texto completoAzhari, Rama y Agita Nisa Salsabila. "Analyzing the Impact of Quantum Computing on Current Encryption Techniques". IAIC Transactions on Sustainable Digital Innovation (ITSDI) 5, n.º 2 (22 de febrero de 2024): 148–57. http://dx.doi.org/10.34306/itsdi.v5i2.662.
Texto completoSubbarayudu, Yerragudipadu, Gurram Vijendar Reddy, Merugu Shankar, Mailagani Ven, P. K. Abhilash y Archana Sehgal. "Cipher Craft: Design and Analysis of Advanced Cryptographic Techniques for Secure Communication Systems". MATEC Web of Conferences 392 (2024): 01112. http://dx.doi.org/10.1051/matecconf/202439201112.
Texto completoL, Shammi. "Advancing Privacy and Confidentiality in the Digital Healthcare Era: The Image Encryption Solution". International Journal of Innovative Research in Information Security 10, n.º 04 (8 de mayo de 2024): 133–38. http://dx.doi.org/10.26562/ijiris.2024.v1004.03.
Texto completoOukili, Soufiane y Seddik Bri. "Hardware Implementation of AES Algorithm with Logic S-box". Journal of Circuits, Systems and Computers 26, n.º 09 (24 de abril de 2017): 1750141. http://dx.doi.org/10.1142/s0218126617501419.
Texto completoOlayah, Fekry, Mohammed Al Yami, Hamad Ali Abosaq, Yahya Ali Abdelrahman Ali, Md Ashraf Siddiqui, Reyazur Rashid Irshad, Samreen Shahwar, Asharul Islam y Rafia Sultana. "An Efficient Lightweight Crypto Security Module for Protecting Data Transmission Through IOT Based Electronic Sensors". Journal of Nanoelectronics and Optoelectronics 19, n.º 6 (1 de junio de 2024): 646–57. http://dx.doi.org/10.1166/jno.2024.3609.
Texto completoN, Swaroop KUMAR. "Encryption with DNA: The Manipulation of DNA to Deal with the Cyber Security Attacks". ECS Transactions 107, n.º 1 (24 de abril de 2022): 8311–20. http://dx.doi.org/10.1149/10701.8311ecst.
Texto completoNirmala, Endar. "Penerapan Steganografi File Gambar Menggunakan Metode Least Significant Bit (LSB) dan Algoritma Kriptografi Advanced Encryption Standard (AES) Berbasis Android". Jurnal Informatika Universitas Pamulang 5, n.º 1 (31 de marzo de 2020): 36. http://dx.doi.org/10.32493/informatika.v5i1.4646.
Texto completoAhmad, Ashraf, Yousef AbuHour, Remah Younisse, Yasmeen Alslman, Eman Alnagi y Qasem Abu Al-Haija. "MID-Crypt: A Cryptographic Algorithm for Advanced Medical Images Protection". Journal of Sensor and Actuator Networks 11, n.º 2 (13 de mayo de 2022): 24. http://dx.doi.org/10.3390/jsan11020024.
Texto completoGowda, V. Dankan, Pratik Gite, Mirzanur Rahman, Kirti Rahul Kadam, G. Manivasagam y K. D. V. Prasad. "Novel approaches to biometric security using enhanced session keys and elliptic curve cryptography". Journal of Discrete Mathematical Sciences and Cryptography 27, n.º 2 (2024): 477–88. http://dx.doi.org/10.47974/jdmsc-1884.
Texto completoSobia Sattar. "Cryptographic Compression Techniques along with some Penetrating Attacks and Possible Security Measures". Lahore Garrison University Research Journal of Computer Science and Information Technology 4, n.º 2 (25 de junio de 2020): 43–57. http://dx.doi.org/10.54692/lgurjcsit.2020.0402133.
Texto completoChorosinski, Len, Venky Sundaram, Klaus Wolter, Richard Calatayud, Parrish Ralston, Scott Suko, David Fry y Nathanael Ellerhoff. "Supply Chain Hardware Integrity for Electronics Defense (SHIELD) Using Small “Dielets”". International Symposium on Microelectronics 2017, n.º 1 (1 de octubre de 2017): 000699–704. http://dx.doi.org/10.4071/isom-2017-thp21_112.
Texto completoGosavi, Mr Abhijeet, Mr Sakib Shaikh, Mr Adnan Sayyed, Mr Somesh Sapa, Mr Ayan Shaikh y Prof A. A. Pund. "Enabling Encrypted Cloud Emails with Data Encryption using Advanced Encryption Techniques". International Journal for Research in Applied Science and Engineering Technology 11, n.º 6 (30 de junio de 2023): 864–69. http://dx.doi.org/10.22214/ijraset.2023.53709.
Texto completoBuddha, Govind Prasad. "Leveraging Cryptographic Hash Functions for Credit Card Fraud Detection". International Journal of Recent Technology and Engineering (IJRTE) 13, n.º 1 (30 de mayo de 2024): 16–21. http://dx.doi.org/10.35940/ijrte.f8019.13010524.
Texto completoSaha, Ankita, Chanda Pathak y Sourav Saha. "A Study of Machine Learning Techniques in Cryptography for Cybersecurity". American Journal of Electronics & Communication 1, n.º 4 (7 de junio de 2021): 22–26. http://dx.doi.org/10.15864/ajec.1404.
Texto completoVivek Tammineedi, Venkata Satya y V. N. Rajavarman. "A Novel Analysis of Advanced Visual Cryptography Techniques for Providing Security Against Web Attacks Using Support Vector Machine Technique". Journal of Computational and Theoretical Nanoscience 17, n.º 5 (1 de mayo de 2020): 2097–114. http://dx.doi.org/10.1166/jctn.2020.8855.
Texto completoPeng, Sheng, Linkai Zhu, Shanwen Hu, Zhiming Cai y Wenjian Liu. "Enhancing Global Blockchain Privacy via a Digital Mutual Trust Mechanism". Mathematics 12, n.º 10 (10 de mayo de 2024): 1481. http://dx.doi.org/10.3390/math12101481.
Texto completoGobinathan, B., M. A. Mukunthan, S. Surendran, K. Somasundaram, Syed Abdul Moeed, P. Niranjan, V. Gouthami et al. "A Novel Method to Solve Real Time Security Issues in Software Industry Using Advanced Cryptographic Techniques". Scientific Programming 2021 (28 de diciembre de 2021): 1–9. http://dx.doi.org/10.1155/2021/3611182.
Texto completoShakya, Subarna y Sanjita Lamichhane. "Secured Crypto Stegano Data Hiding Using Least Significant Bit Substitution and Encryption". Journal of Advanced College of Engineering and Management 2 (29 de noviembre de 2016): 105. http://dx.doi.org/10.3126/jacem.v2i0.16103.
Texto completoKumar, Boddupalli Anvesh y V. Bapuji. "Efficient privacy preserving communication protocol for IOT applications". Brazilian Journal of Development 10, n.º 1 (5 de enero de 2024): 402–19. http://dx.doi.org/10.34117/bjdv10n1-025.
Texto completoSinaga, Nurainun Hasanah y Muhammad Syahrizal. "Implementasi Algoritma Mars Pada Pengamanan SMS". JURIKOM (Jurnal Riset Komputer) 7, n.º 3 (14 de junio de 2020): 398. http://dx.doi.org/10.30865/jurikom.v7i3.2175.
Texto completoC.Kanmani Pappa. "Zero-Trust Cryptographic Protocols and Differential Privacy Techniques for Scalable Secure Multi-Party Computation in Big Data Analytics". Journal of Electrical Systems 20, n.º 5s (13 de abril de 2024): 2114–23. http://dx.doi.org/10.52783/jes.2550.
Texto completovan Gastel, Bernard E., Bart Jacobs y Jean Popma. "Data Protection Using Polymorphic Pseudonymisation in a Large-Scale Parkinson’s Disease Study". Journal of Parkinson's Disease 11, s1 (16 de julio de 2021): S19—S25. http://dx.doi.org/10.3233/jpd-202431.
Texto completoDhiman, Oshin y Anand Sharma. "Enhancement for Secured File Storage Using Modern Hybrid Cryptography". International Journal on Future Revolution in Computer Science & Communication Engineering 8, n.º 1 (31 de marzo de 2022): 01–07. http://dx.doi.org/10.17762/ijfrcsce.v8i1.2083.
Texto completoMoldamurat, Khuralay, Yerzhan Seitkulov, Sabyrzhan Atanov, Makhabbat Bakyt y Banu Yergaliyeva. "Enhancing cryptographic protection, authentication, and authorization in cellular networks: a comprehensive research study". International Journal of Electrical and Computer Engineering (IJECE) 14, n.º 1 (1 de febrero de 2024): 479. http://dx.doi.org/10.11591/ijece.v14i1.pp479-487.
Texto completoOlaniyan, Olatayo Moses, Ayobami Taiwo Olusesi, Bolaji Abigail Omodunbi, Wajeed Bolanle Wahab, Olusogo Julius Adetunji y Bamidele Musiliu Olukoya. "A Data Security Model for Mobile Ad Hoc Network Using Linear Function Mayfly Advanced Encryption Standard". International Journal of Emerging Technology and Advanced Engineering 13, n.º 3 (1 de marzo de 2023): 101–10. http://dx.doi.org/10.46338/ijetae0323_10.
Texto completoAlthobaiti, Hamad y Ahmed Adas. "Simulation of Elliptical Curve Cryptography in IPSec on Ad-Hoc Networks". European Journal of Engineering and Formal Sciences 6, n.º 1 (4 de abril de 2023): 1–26. http://dx.doi.org/10.26417/687zrj13.
Texto completo