Literatura académica sobre el tema "Encryption techniques"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Encryption techniques".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Encryption techniques"
Et. al., Jaichandran R,. "A Hybrid Encryption Model with Attribute Based Encryption and Advanced Encryption Standard Techniques". Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, n.º 2 (11 de abril de 2021): 334–36. http://dx.doi.org/10.17762/turcomat.v12i2.720.
Texto completoRamanathan, Thirumalaimuthu, Md Jakir Hossen, Md Shohel Sayeed y Joseph Emerson Raja. "Survey on computational intelligence based image encryption techniques". Indonesian Journal of Electrical Engineering and Computer Science 19, n.º 3 (1 de septiembre de 2020): 1428. http://dx.doi.org/10.11591/ijeecs.v19.i3.pp1428-1435.
Texto completoParenreng, Jumadi Mabe, Sahraeni Maulida Mustari y Abdul Wahid. "E-mail Security System Using El-Gamal Hybrid Algorithm and AES (Advanced Encryption Standard) Algorithm". Internet of Things and Artificial Intelligence Journal 2, n.º 1 (16 de febrero de 2022): 1–9. http://dx.doi.org/10.31763/iota.v2i1.510.
Texto completoSharma, Ramandeep, Richa Sharma y Harmanjit Singh. "Classical Encryption Techniques". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 3, n.º 1 (1 de agosto de 2012): 84–90. http://dx.doi.org/10.24297/ijct.v3i1b.2745.
Texto completoYeow, Sin-Qian y Kok-Why Ng. "Neural Network Based Data Encryption: A Comparison Study among DES, AES, and HE Techniques". JOIV : International Journal on Informatics Visualization 7, n.º 3-2 (30 de noviembre de 2023): 2086. http://dx.doi.org/10.30630/joiv.7.3-2.2336.
Texto completoLi, Bingcheng, Dingkang Li y Mingyuan Zhu. "Application analysis of data encryption technology". Applied and Computational Engineering 50, n.º 1 (25 de marzo de 2024): 199–205. http://dx.doi.org/10.54254/2755-2721/50/20241502.
Texto completoThabit, Zainab Hasan, Sadiq A. Mehdi y Bashar M. Nema. "Enhancing Color Image Security: Encryption with Dynamic Chaotic Three-Dimensional System and Robust Security Analysis". Al-Mustansiriyah Journal of Science 34, n.º 4 (30 de diciembre de 2023): 87–95. http://dx.doi.org/10.23851/mjs.v34i4.1411.
Texto completoYang, Ming, Monica Trifas, Guillermo Francia III y Lei Chen. "Cryptographic and Steganographic Approaches to Ensure Multimedia Information Security and Privacy". International Journal of Information Security and Privacy 3, n.º 3 (julio de 2009): 37–54. http://dx.doi.org/10.4018/jisp.2009100703.
Texto completoAlslman, Yasmeen, Eman Alnagi, Ashraf Ahmad, Yousef AbuHour, Remah Younisse y Qasem Abu Al-haija. "Hybrid Encryption Scheme for Medical Imaging Using AutoEncoder and Advanced Encryption Standard". Electronics 11, n.º 23 (30 de noviembre de 2022): 3967. http://dx.doi.org/10.3390/electronics11233967.
Texto completoMohammed, Zahraa A., Hadeel Qasem Gheni, Zahraa Jabbar Hussein y Ali Kadhum M. Al-Qurabat. "Advancing Cloud Image Security via AES Algorithm Enhancement Techniques". Engineering, Technology & Applied Science Research 14, n.º 1 (8 de febrero de 2024): 12694–701. http://dx.doi.org/10.48084/etasr.6601.
Texto completoTesis sobre el tema "Encryption techniques"
Wang, Yongsheng. "Advanced video encryption techniques". Thesis, Queen's University Belfast, 2013. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.602966.
Texto completoDutta, Saurabh. "Approach towards development of efficient encryption techniques". Thesis, University of North Bengal, 2004. http://hdl.handle.net/123456789/26.
Texto completoKasarabada, Yasaswy V. "Efficient Logic Encryption Techniques for Sequential Circuits". University of Cincinnati / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1613752483402656.
Texto completoTalhah, Saad. "Advanced Encryption Techniques using New Mersenne Number Transforms". Thesis, University of Leeds, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.515408.
Texto completoChen, Hang. "Optical Encryption Techniques for Color Image and Hyperspectral Data". Thesis, Université de Lorraine, 2017. http://www.theses.fr/2017LORR0374.
Texto completoOptical information security is one of the most important research directions in information science and technology, especially in the field of copyright protection, confidential information transmission/storage and military remote sensing. Since double random phase encoding technology (DRPE) was proposed, optical image encryption technology has become the main topic of optical information security and it has been developed and studied deeply. Optical encryption techniques offer the possibility of high-speed parallel processing of two dimension image data and hiding information in many different dimensions. In this context, much significant research and investigation on optical image encryption have been presented based on DRPE or further optical operation, such as digital holography, Fresnel transform, gyrator transform. Simultaneously, the encrypted image has been extended from single gray image to double image, color image and multi-image. However, the hyperspectral image, as a significant element in military and commercial remote sensing, has not been deeply researched in optical encryption area until now. This work extends the optical encryption technology from color image to hyperspectral image. For better comprehension of hyperspectral image encryption, this work begins with the introduction and analysis of the characteristics of hyperspectral cube. Subsequently, several kinds of encryption schemes for color image, including symmetric and asymmetric cryptosystem, are presented individually. Furthermore, the optical encryption algorithms for hyperspectral cube are designed for securing both the spatial and spectral information simultaneously. Some numerical simulations are given to validate the performance of the proposed encryption schemes. The corresponding attack experiment results demonstrate the capability and robustness of the approaches designed in this work. The research in this dissertation provides reference for the further practicality of hyperspectral image encryption
Jha, Pawan Kumar. "AN APPROACH TOWARDS DESIGN AND IMPLEMENTATION OF SYMMETRIC ENCRYPTION TECHNIQUES". Thesis, University of North Bengal, 2006. http://hdl.handle.net/123456789/11.
Texto completoWong, Hon Wah. "Image watermarking and data hiding techniques /". View Abstract or Full-Text, 2003. http://library.ust.hk/cgi/db/thesis.pl?ELEC%202003%20WONGH.
Texto completoIncludes bibliographical references (leaves 163-178). Also available in electronic version. Access restricted to campus users.
Brisbane, Gareth Charles Beattie. "On information hiding techniques for digital images". Access electronically, 2004. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20050221.122028/index.html.
Texto completoGuruswamy, Aarumugam Bhupathi Rajan. "Independent Domain of Symmetric Encryption using Least SignificantBit : Computer Vision, Steganography and Cryptography Techniques". Thesis, Högskolan Dalarna, Datateknik, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:du-10063.
Texto completoZhao, Weiliang, University of Western Sydney, of Science Technology and Environment College y School of Computing and Information Technology. "Security techniques for electronic commerce applications". THESIS_CSTE_CIT_Zhao_W.xml, 2003. http://handle.uws.edu.au:8081/1959.7/127.
Texto completoMaster of Science (Hons)
Libros sobre el tema "Encryption techniques"
Held, Gilbert. Top secret data encryption techniques. Carmel, Ind: Sams Pub., 1993.
Buscar texto completoLian, Shiguo. Multimedia content encryption: Techniques and applications. Boca Raton: Auerbach Publications, 2008.
Buscar texto completoBorivoje, Furht y Kirovski Darko, eds. Multimedia encryption and authentication techniques and applications. Boca Raton, Fla: Auerbach Publications, 2006.
Buscar texto completoHeld, Gilbert. Learn encryption techniques with BASIC and C++. Plano, Tex: Wordware Pub., 1999.
Buscar texto completoGriffiths, James. Investigate, code and compare techniques used in implementing encryption technology. Oxford: Oxford Brookes University, 2003.
Buscar texto completoSwenson, Christopher. Modern cryptanalysis: Techniques for advanced code breaking. Indianapolis, IN: Wiley Pub., 2008.
Buscar texto completoS, Schmalz Mark, Society of Photo-optical Instrumentation Engineers. y Society for Industrial and Applied Mathematics., eds. Mathematics and applications of data/image coding, compression, and encryption III: 2 August 2000, San Diego, USA. Bellingham, Wash., USA: SPIE, 2000.
Buscar texto completoS, Schmalz Mark y Society of Photo-optical Instrumentation Engineers., eds. Mathematics of data/image coding, compression, and encryption VII, with applications: 4-5 August, 2004, Denver, Colorado, USA. Bellingham, Wash: SPIE, 2004.
Buscar texto completoShih, Frank Y. Digital watermarking and steganography: Fundamentals and techniques. Boca Raton, Fl: Taylor & Francis, 2008.
Buscar texto completoWold, Geoffrey H. Computer crime: Techniques, prevention. Rolling Meadows, Ill: Bankers Pub. Co., 1989.
Buscar texto completoCapítulos de libros sobre el tema "Encryption techniques"
Albrecht, Martin y Carlos Cid. "Algebraic Techniques in Differential Cryptanalysis". En Fast Software Encryption, 193–208. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03317-9_12.
Texto completoGautam, Tanvi. "Identity—Based Encryption". En Emerging Security Algorithms and Techniques, editado por Aditya Thakkar y Nitish Pathak, 159–81. Boca Raton : Taylor & Francis, a CRC title, part of the Taylor &: Chapman and Hall/CRC, 2019. http://dx.doi.org/10.1201/9781351021708-10.
Texto completoGautam, Tanvi, Aditya Thakkar y Nitish Pathak. "Attribute-Based Encryption". En Emerging Security Algorithms and Techniques, 183–95. Boca Raton : Taylor & Francis, a CRC title, part of the Taylor &: Chapman and Hall/CRC, 2019. http://dx.doi.org/10.1201/9781351021708-11.
Texto completoGouget, Aline, Hervé Sibert, Côme Berbain, Nicolas Courtois, Blandine Debraize y Chris Mitchell. "Analysis of the Bit-Search Generator and Sequence Compression Techniques". En Fast Software Encryption, 196–214. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11502760_13.
Texto completoThanki, Rohit M. "Audio Watermarking with Encryption". En Advanced Techniques for Audio Watermarking, 59–81. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-24186-5_5.
Texto completoDinur, Itai, Orr Dunkelman, Nathan Keller y Adi Shamir. "Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64". En Fast Software Encryption, 390–410. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-46706-0_20.
Texto completoLu, Rongxing. "Homomorphic Public Key Encryption Techniques". En Wireless Networks, 13–40. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-32899-7_2.
Texto completoRajendiran, M., B. Syed Ibrahim, R. Pratheesh y C. Nelson Kennnedy Babu. "Multilanguage Based SMS Encryption Techniques". En Advances in Intelligent Systems and Computing, 455–60. New Delhi: Springer India, 2013. http://dx.doi.org/10.1007/978-81-322-0740-5_55.
Texto completoMishra, Prasanna Raghaw, Indivar Gupta y Navneet Gaba. "Cryptanalysis of Multilanguage Encryption Techniques". En Mathematics and Computing 2013, 13–21. New Delhi: Springer India, 2014. http://dx.doi.org/10.1007/978-81-322-1952-1_2.
Texto completoChen, Huaifeng y Xiaoyun Wang. "Improved Linear Hull Attack on Round-Reduced Simon with Dynamic Key-Guessing Techniques". En Fast Software Encryption, 428–49. Berlin, Heidelberg: Springer Berlin Heidelberg, 2016. http://dx.doi.org/10.1007/978-3-662-52993-5_22.
Texto completoActas de conferencias sobre el tema "Encryption techniques"
Liu Nan, Wang Huifen y Fan Jing. "Time hopping encryption techniques". En IET 2nd International Conference on Wireless, Mobile and Multimedia Networks (ICWMMN 2008). IEE, 2008. http://dx.doi.org/10.1049/cp:20081040.
Texto completoMalladar, Rohit y Sanjeev Kunte. "Selective video encryption using Sattolo's encryption technique". En 2016 International Conference on Electrical, Electronics, Communication, Computer and Optimization Techniques (ICEECCOT). IEEE, 2016. http://dx.doi.org/10.1109/iceeccot.2016.7955228.
Texto completoShafiq, Sobia, Sundas Hanif, Fasih Ur Rehman, Kamran Tariq y Adeel Nawaz. "Video Encryption Techniques: A Review". En 2019 International Conference on Digitization (ICD). IEEE, 2019. http://dx.doi.org/10.1109/icd47981.2019.9105707.
Texto completoKoganti, Venkata SreeKrishna, Lavanya K. Galla, Nagarjuna Nuthalapati y Anil Varma Kakarlapudi. "Authentication protocols using encryption techniques". En 2016 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT). IEEE, 2016. http://dx.doi.org/10.1109/iccicct.2016.7987921.
Texto completoShunmugan, S. y P. Arockia Jansi Rani. "Encryption-then-compression techniques: A survey". En 2016 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT). IEEE, 2016. http://dx.doi.org/10.1109/iccicct.2016.7988037.
Texto completoDivanshu, Hitu Singla, Vikash Sharma, Bharti Sharma y Prateek Thakral. "A Quick Tour to Encryption Techniques". En 2018 2nd International Conference on Trends in Electronics and Informatics (ICOEI). IEEE, 2018. http://dx.doi.org/10.1109/icoei.2018.8553758.
Texto completoSingh, Kehar. "Optical encryption techniques for data security". En 19th Congress of the International Commission for Optics: Optics for the Quality of Life, editado por Giancarlo C. Righini y Anna Consortini. SPIE, 2003. http://dx.doi.org/10.1117/12.524636.
Texto completoOgiela, Marek R. y Marcin Oczko. "Comparison of Selected Homomorphic Encryption Techniques". En 2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA). IEEE, 2018. http://dx.doi.org/10.1109/aina.2018.00159.
Texto completoWeir, M. "6.1 Encryption Techniques for Test Data". En ettc2022 - European Test and Telemetry Conference. AMA Service GmbH, Von-Münchhausen-Str. 49, 31515 Wunstorf, Germany, 2022. http://dx.doi.org/10.5162/ettc2022/6.1.
Texto completoShyamala, N. y K. Anusudha. "Reversible Chaotic Encryption Techniques For Images". En 2017 Fourth International Conference on Signal Processing,Communication and Networking (ICSCN). IEEE, 2017. http://dx.doi.org/10.1109/icscn.2017.8085656.
Texto completoInformes sobre el tema "Encryption techniques"
Rannenberg, Kai, Sebastian Pape, Frédéric Tronnier y Sascha Löbner. Study on the Technical Evaluation of De-Identification Procedures for Personal Data in the Automotive Sector. Universitätsbibliothek Johann Christian Senckenberg, octubre de 2021. http://dx.doi.org/10.21248/gups.63413.
Texto completo