Artículos de revistas sobre el tema "Symmetric encryption techniques"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Symmetric encryption techniques".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Parenreng, Jumadi Mabe, Sahraeni Maulida Mustari y Abdul Wahid. "E-mail Security System Using El-Gamal Hybrid Algorithm and AES (Advanced Encryption Standard) Algorithm". Internet of Things and Artificial Intelligence Journal 2, n.º 1 (16 de febrero de 2022): 1–9. http://dx.doi.org/10.31763/iota.v2i1.510.
Texto completoMalhotra, Anoushka, Ashwin Arora y Dr Manjot Kaur Bhatia. "Symmetric Cryptographic Approaches". International Journal for Research in Applied Science and Engineering Technology 10, n.º 12 (31 de diciembre de 2022): 718–21. http://dx.doi.org/10.22214/ijraset.2022.47982.
Texto completoChowdhary, Chiranji Lal, Pushpam Virenbhai Patel, Krupal Jaysukhbhai Kathrotia, Muhammad Attique, Kumaresan Perumal y Muhammad Fazal Ijaz. "Analytical Study of Hybrid Techniques for Image Encryption and Decryption". Sensors 20, n.º 18 (10 de septiembre de 2020): 5162. http://dx.doi.org/10.3390/s20185162.
Texto completoM, Sreekala y Varghese Paul. "A Novel Hybrid Encryption Method for Multimedia Encryption Using Elliptic Curve Cryptography and TDMRC". International Journal of Emerging Research in Management and Technology 6, n.º 7 (29 de junio de 2018): 1. http://dx.doi.org/10.23956/ijermt.v6i7.178.
Texto completoPushpendra, Tiwari. "A study and comparison of the various cryptography technique standards within fifteen factors". i-manager's Journal on Digital Forensics & Cyber Security 1, n.º 1 (2023): 21. http://dx.doi.org/10.26634/jdf.1.1.19134.
Texto completoKuppuswamy, Prakash, Saeed Qasim Yahya Al Khalidi Al-Maliki, Rajan John, Mohammad Haseebuddin y Ahmed Ali Shaik Meeran. "A hybrid encryption system for communication and financial transactions using RSA and a novel symmetric key algorithm". Bulletin of Electrical Engineering and Informatics 12, n.º 2 (1 de abril de 2023): 1148–58. http://dx.doi.org/10.11591/eei.v12i2.4967.
Texto completoAhamad, Md Martuza y Md Ibrahim Abdullah. "Comparison of Encryption Algorithms for Multimedia". Rajshahi University Journal of Science and Engineering 44 (19 de noviembre de 2016): 131–39. http://dx.doi.org/10.3329/rujse.v44i0.30398.
Texto completoZhu, Bingxin, Puwen Wei y Mingqiang Wang. "Adaptive Security of Broadcast Encryption, Revisited". Security and Communication Networks 2017 (2017): 1–16. http://dx.doi.org/10.1155/2017/1404279.
Texto completoParveen Sehgal, Satinder ,. "Design a Hybrid Algorithm for Data Encryption to Implementation in Database". Tuijin Jishu/Journal of Propulsion Technology 44, n.º 4 (16 de octubre de 2023): 1328–37. http://dx.doi.org/10.52783/tjjpt.v44.i4.1037.
Texto completoUbaidullah, Mohammad y Qahtan Makki. "A Review on Symmetric Key Encryption Techniques in Cryptography". International Journal of Computer Applications 147, n.º 10 (16 de agosto de 2016): 43–48. http://dx.doi.org/10.5120/ijca2016911203.
Texto completoThomas, Ambili y V. Lakshmi Narasimhan. "Symmetric and Asymmetric Encryption Algorithm Modeling on CPU Execution Time as Employed Over a Mobile Environment". International Journal of Natural Computing Research 10, n.º 2 (abril de 2021): 21–41. http://dx.doi.org/10.4018/ijncr.2021040102.
Texto completoParthasarathy, Rajamohan, Seow Soon Loong y Preethy Ayyappan. "An Efficient Encryption Implementation Using AES Algorithm Techniques". Journal of Engineering & Technological Advances 3, n.º 1 (2018): 61–70. http://dx.doi.org/10.35934/segi.v3i1.61.
Texto completoDhiman, Oshin y Anand Sharma. "Enhancement for Secured File Storage Using Modern Hybrid Cryptography". International Journal on Future Revolution in Computer Science & Communication Engineering 8, n.º 1 (31 de marzo de 2022): 01–07. http://dx.doi.org/10.17762/ijfrcsce.v8i1.2083.
Texto completoChandrakala B M, Latha A P, B. V. Shruti. "Optimizing the Application of Hybrid Cryptographic Methods for Secure File Storage and Retrieval". Tuijin Jishu/Journal of Propulsion Technology 44, n.º 4 (27 de octubre de 2023): 2126–33. http://dx.doi.org/10.52783/tjjpt.v44.i4.1191.
Texto completoBenyahia, Kadda, Meftah Mustapha y Latreche Abdelkrim. "A Bio-Inspired Algorithm for Symmetric Encryption". International Journal of Organizational and Collective Intelligence 10, n.º 1 (enero de 2020): 1–13. http://dx.doi.org/10.4018/ijoci.2020010101.
Texto completoAbdElminaam, DiaaSalama, Hatem M. Abdul Kader, Mohie M. Hadhoud y Salah M. El-Sayed. "Developing and Evaluation of New Hybrid Encryption Algorithms". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 13, n.º 1 (28 de marzo de 2014): 4038–52. http://dx.doi.org/10.24297/ijct.v13i1.2926.
Texto completoHaryono, Wasis. "Comparison Encryption of How to Work Caesar Cipher, Hill Cipher, Blowfish and Twofish". Data Science: Journal of Computing and Applied Informatics 4, n.º 2 (31 de julio de 2020): 100–110. http://dx.doi.org/10.32734/jocai.v4.i2-4004.
Texto completoJabir, Hawraa. "An Overview of Parallel Symmetric Cipher of Messages". JOURNAL OF UNIVERSITY OF BABYLON for Pure and Applied Sciences 31, n.º 2 (29 de junio de 2023): 19–33. http://dx.doi.org/10.29196/jubpas.v31i2.4652.
Texto completo., Sonika, Sandeep Kumar Arora y Mahedi Masud. "Review on Security Based Vehicular Ad-Hoc Network". International Journal of Engineering & Technology 7, n.º 3.8 (7 de julio de 2018): 125. http://dx.doi.org/10.14419/ijet.v7i3.8.16846.
Texto completoRabie, A., Kh El Shafie, A. Hammuoda y M. Rohiem. "Data ecryption based on multi-order FrFT, and FPGA implementation of DES algorith". International Journal of Reconfigurable and Embedded Systems (IJRES) 9, n.º 2 (1 de julio de 2020): 141. http://dx.doi.org/10.11591/ijres.v9.i2.pp141-152.
Texto completoAminudin, Nur, Andino Maseleno, Shankar K, S. Hemalatha, K. Sathesh kumar, Fauzi ., Rita Irviani y Muhamad Muslihudin. "Nur Algorithm on Data Encryption and Decryption". International Journal of Engineering & Technology 7, n.º 2.26 (7 de mayo de 2018): 109. http://dx.doi.org/10.14419/ijet.v7i2.26.14363.
Texto completoManiyath, Shima Ramesh y Thanikaiselvan V. "A novel efficient multiple encryption algorithm for real time images". International Journal of Electrical and Computer Engineering (IJECE) 10, n.º 2 (1 de abril de 2020): 1327. http://dx.doi.org/10.11591/ijece.v10i2.pp1327-1336.
Texto completoTumati, Gowtham, Yalamarthi Rajesh, Manogna T y J. Ram Kumar. "A New Encryption Algorithm Using Symmetric Key Cryptography". International Journal of Engineering & Technology 7, n.º 2.32 (31 de mayo de 2018): 436. http://dx.doi.org/10.14419/ijet.v7i2.32.15734.
Texto completoKuppuswamy, Prakash y Dr Saeed Q Y Al-Khalidi. "IMPLEMENTATION OF SECURITY THROUGH SIMPLE SYMMETRIC KEY ALGORITHM BASED ON MODULO 37". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 3, n.º 2 (30 de octubre de 2012): 335–38. http://dx.doi.org/10.24297/ijct.v3i2c.2896.
Texto completoHe, Wei, Yu Zhang y Yin Li. "Fast, Searchable, Symmetric Encryption Scheme Supporting Ranked Search". Symmetry 14, n.º 5 (18 de mayo de 2022): 1029. http://dx.doi.org/10.3390/sym14051029.
Texto completoGui, Zichen, Kenneth G. Paterson, Sikhar Patranabis y Bogdan Warinschi. "SWiSSSE: System-Wide Security for Searchable Symmetric Encryption". Proceedings on Privacy Enhancing Technologies 2024, n.º 1 (enero de 2024): 549–81. http://dx.doi.org/10.56553/popets-2024-0032.
Texto completoKour, Avleen. "Secure Authentication in Cloud Computing using Diffie Hellman and One Time Password". International Journal for Research in Applied Science and Engineering Technology 9, n.º VI (30 de junio de 2021): 4375–80. http://dx.doi.org/10.22214/ijraset.2021.36037.
Texto completoHarba, E. S. I. "Secure Data Encryption Through a Combination of AES, RSA and HMAC". Engineering, Technology & Applied Science Research 7, n.º 4 (9 de agosto de 2017): 1781–85. http://dx.doi.org/10.48084/etasr.1272.
Texto completoBerisha, Artan y Hektor Kastrati. "Parallel impelementation of RC6 algorithm". Journal of Computer Science and Technology Studies 3, n.º 2 (26 de junio de 2021): 01–09. http://dx.doi.org/10.32996/jcsts.2021.3.2.1.
Texto completoVennela, Vasireddy. "Lightweight Cryptography Algorithms for IOT Devices". International Journal for Research in Applied Science and Engineering Technology 9, n.º VI (20 de junio de 2021): 1678–83. http://dx.doi.org/10.22214/ijraset.2021.35358.
Texto completoDhakne, Dr Amol, Prasann Shimpi, Sanket Halake, Shivam Dharmshetti y Shashank Singh. "Neural Network Based Message Concealment Scheme". International Journal for Research in Applied Science and Engineering Technology 10, n.º 5 (31 de mayo de 2022): 1368–78. http://dx.doi.org/10.22214/ijraset.2022.42522.
Texto completoRaja, S. P. "Multiscale transform-based secured joint efficient medical image compression-encryption using symmetric key cryptography and ebcot encoding technique". International Journal of Wavelets, Multiresolution and Information Processing 17, n.º 05 (septiembre de 2019): 1950034. http://dx.doi.org/10.1142/s0219691319500346.
Texto completoVergoossen, Tom, Robert Bedington, James A. Grieve y Alexander Ling. "Satellite Quantum Communications When Man-in-the-Middle Attacks Are Excluded". Entropy 21, n.º 4 (10 de abril de 2019): 387. http://dx.doi.org/10.3390/e21040387.
Texto completoVerma, Saurav, Mahek Pokharna y Vishal Mishra. "Identifying and analyzing Risk Mitigation strategies in IOT devices using Light Weight Symmetric Encryption Algorithms". International Journal for Research in Applied Science and Engineering Technology 10, n.º 9 (30 de septiembre de 2022): 638–46. http://dx.doi.org/10.22214/ijraset.2022.46697.
Texto completoKaushik, Bharti, Vikas Malik y Vinod Saroha. "A Review Paper on Data Encryption and Decryption". International Journal for Research in Applied Science and Engineering Technology 11, n.º 4 (30 de abril de 2023): 1986–92. http://dx.doi.org/10.22214/ijraset.2023.50101.
Texto completoLai, Jian-Foo y Swee-Huay Heng. "Secure File Storage On Cloud Using Hybrid Cryptography". Journal of Informatics and Web Engineering 1, n.º 2 (15 de septiembre de 2022): 1–18. http://dx.doi.org/10.33093/jiwe.2022.1.2.1.
Texto completoAlothman, Raya Basil, Imad Ibraheem Saada y Basma Salim Bazel Al-Brge. "A Performance-Based Comparative Encryption and Decryption Technique for Image and Video for Mobile Computing". Journal of Cases on Information Technology 24, n.º 2 (abril de 2022): 1–18. http://dx.doi.org/10.4018/jcit.20220101.oa1.
Texto completoPark, Juhyun y Yongsu Park. "Symmetric-Key Cryptographic Routine Detection in Anti-Reverse Engineered Binaries Using Hardware Tracing". Electronics 9, n.º 6 (8 de junio de 2020): 957. http://dx.doi.org/10.3390/electronics9060957.
Texto completoBhandari, Ashok Singh. "Analysis of Computational Algebra for Cryptography and Coding Theory Applications". Mathematical Statistician and Engineering Applications 70, n.º 1 (31 de enero de 2021): 598–606. http://dx.doi.org/10.17762/msea.v70i1.2513.
Texto completoYesin, V. I. y V. V. Vilihura. "Research on the main methods and schemes of encryption with search capability". Radiotekhnika, n.º 209 (24 de junio de 2022): 138–55. http://dx.doi.org/10.30837/rt.2022.2.209.14.
Texto completoKovalchuk, A. M., Yuriy Peleckh y Tetiana Bubela. "BIT OPERATIONS WITH ELEMENTS OF THE RSA ALGORITHM IN ENCRYPTION-DECRYPTION OF COLOR IMAGES". Measuring Equipment and Metrology 83, n.º 3 (2022): 5–10. http://dx.doi.org/10.23939/istcmtm2022.03.005.
Texto completoAdy Putra, Wahyu, Suyanto Suyanto y Muhammad Zarlis. "Performance Analysis Of The Combination Of Advanced Encryption Standard Cryptography Algorithms With Luc For Text Security". SinkrOn 8, n.º 2 (6 de abril de 2023): 890–97. http://dx.doi.org/10.33395/sinkron.v8i2.12202.
Texto completoSeelamanthula Sreenivasu, Et al. "DAR Model: A Novel Symmetric Key Enabled Security architecture for reliable data transfer in Wireless Sensor Networks". International Journal on Recent and Innovation Trends in Computing and Communication 11, n.º 10 (2 de noviembre de 2023): 717–28. http://dx.doi.org/10.17762/ijritcc.v11i10.8568.
Texto completoHanin, Charifa, Fouzia Omary, Souad Elbernoussi, Khadija Achkoun y Bouchra Echandouri. "A New Block Cipher System Using Cellular Automata and Ant Colony Optimization (BC-CaACO)". International Journal of Information Security and Privacy 12, n.º 4 (octubre de 2018): 54–67. http://dx.doi.org/10.4018/ijisp.2018100104.
Texto completoAlmaiah, Mohammed Amin, Ziad Dawahdeh, Omar Almomani, Adeeb Alsaaidah, Ahmad Al-Khasawneh y Saleh Khawatreh. "A new hybrid text encryption approach over mobile ad hoc network". International Journal of Electrical and Computer Engineering (IJECE) 10, n.º 6 (1 de diciembre de 2020): 6461. http://dx.doi.org/10.11591/ijece.v10i6.pp6461-6471.
Texto completoJasim, Khalid F., Reem J. Ismail, Abdullah A. Nahi Al-Rabeeah y Soma Solaimanzadeh. "Analysis the Structures of Some Symmetric Cipher Algorithms Suitable for the Security of IoT Devices". Cihan University-Erbil Scientific Journal 5, n.º 2 (1 de septiembre de 2021): 13–19. http://dx.doi.org/10.24086/cuesj.v5n2y2021.pp13-19.
Texto completoSholikhatin, Siti Alvi, Adam Prayogo Kuncoro, Afifah Lutfia Munawaroh y Gilang Aji Setiawan. "Comparative Study of RSA Asymmetric Algorithm and AES Algorithm for Data Security". Edu Komputika Journal 9, n.º 1 (11 de enero de 2023): 60–67. http://dx.doi.org/10.15294/edukomputika.v9i1.57389.
Texto completoWang, Peng y Xiang Li. "TEDL: A Text Encryption Method Based on Deep Learning". Applied Sciences 11, n.º 4 (17 de febrero de 2021): 1781. http://dx.doi.org/10.3390/app11041781.
Texto completoM. Subhashini, K. Shankar,. "Hybrid Encryption based Access Control Approach for Securing Cloud Computing". International Journal on Recent and Innovation Trends in Computing and Communication 11, n.º 9 (30 de octubre de 2023): 1056–63. http://dx.doi.org/10.17762/ijritcc.v11i9.8998.
Texto completoChatterjee, Runa, Rajdeep Chakraborty y Mondal J.K. "DESIGN OF LIGHTWEIGHT CRYPTOGRAPHIC MODEL FOR END-TO-END ENCRYPTION IN IOT DOMAIN". IRO Journal on Sustainable Wireless Systems 1, n.º 04 (8 de diciembre de 2019): 215–24. http://dx.doi.org/10.36548/jsws.2019.4.002.
Texto completo