Letteratura scientifica selezionata sul tema "Decryption"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Consulta la lista di attuali articoli, libri, tesi, atti di convegni e altre fonti scientifiche attinenti al tema "Decryption".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Articoli di riviste sul tema "Decryption"
Partala, Juha. "Symmetric Blind Decryption with Perfect Secrecy." Journal of Computer Networks and Communications 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/6575907.
Testo completoZheng, Ting, and Zhi Zhong Zhang. "A Method Based on Hash Table to Implement the NAS Layer Decryption in LTE Big Data Platform." Applied Mechanics and Materials 716-717 (December 2014): 1430–33. http://dx.doi.org/10.4028/www.scientific.net/amm.716-717.1430.
Testo completoBrygilevych, Volodymyr, Nazar Pelypets, and Vasyl Rabyk. "Encryption of text messages using multilayer neural networks." Computational Problems of Electrical Engineering 10, no. 2 (December 2, 2020): 1–6. http://dx.doi.org/10.23939/jcpee2020.02.001.
Testo completoKundu, Srijita, and Ernest Y. Z. Tan. "Device-independent uncloneable encryption." Quantum 9 (January 8, 2025): 1582. https://doi.org/10.22331/q-2025-01-08-1582.
Testo completoPopescu, Narcis I., Cristina Lupu, and Florea Lupu. "Calcium Ionophore-Induced Tissue Factor (TF) Decryption Induces TF Immobilization Into Lipid Rafts and Negative Regulation of TF Procoagulant Activity." Blood 116, no. 21 (November 19, 2010): 1131. http://dx.doi.org/10.1182/blood.v116.21.1131.1131.
Testo completoLiang, Hangyu. "The Battle of Advantage between Stealing and Decrypting the German Naval Enigma Key in the Battle of the Atlantic (1940-1941)." Transactions on Social Science, Education and Humanities Research 12 (August 29, 2024): 346–54. http://dx.doi.org/10.62051/1ny8bm98.
Testo completoSafitri, Sukmawati Indah, Muhammad Khudzaifah, and Mohammad Nafie Jauhari. "Penyandian Pesan Hybrid dengan Myszkowski Cipher dan Rivest, Shamir, Adleman (RSA)." Jurnal Riset Mahasiswa Matematika 2, no. 6 (September 1, 2023): 214–20. http://dx.doi.org/10.18860/jrmm.v2i6.22017.
Testo completoPatil, Vedika, Sakshi Jain, and Yogita Shah. "Secure Cryptography by Using Hash Application." Journal of Cyber Security in Computer System 1, no. 1 (May 11, 2022): 18–24. http://dx.doi.org/10.46610/jcscs.2022.v01i01.002.
Testo completoIrwanto, Dola. "File Encryption and Decryption Using Algorithm Aes-128 Bit Based Website." MALCOM: Indonesian Journal of Machine Learning and Computer Science 4, no. 2 (April 1, 2024): 670–77. http://dx.doi.org/10.57152/malcom.v4i2.1305.
Testo completoLiu, Bao Long, Hua Chen, and Yi Guo. "Encrypted XML Data Query Processing with Range Query." Applied Mechanics and Materials 65 (June 2011): 241–45. http://dx.doi.org/10.4028/www.scientific.net/amm.65.241.
Testo completoTesi sul tema "Decryption"
Strand, Martin. "Verifiable Shuffled Decryption." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for matematiske fag, 2013. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-21427.
Testo completoBurman, Annie. "Gendering decryption - decrypting gender : The gender discourse of labour at Bletchley Park 1939-1945." Thesis, Uppsala universitet, Historiska institutionen, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-201046.
Testo completoTakagi, Tsuyoshi. "New public-key cryptosystems with fast decryption." Phd thesis, [S.l. : s.n.], 2001. http://deposit.ddb.de/cgi-bin/dokserv?idn=962729302.
Testo completoKäck, Emil. "TLS Decryption in passive monitoring system with server private key." Thesis, Umeå universitet, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-184490.
Testo completoMerz, Doug, and Bruce Maples. "Encrypt/Decrypt COMSEC Unit for Space-based Command and Telemetry Applications." International Foundation for Telemetering, 2003. http://hdl.handle.net/10150/605565.
Testo completoLoban, H. "A VHDL Implemetation of the Advanced Encryption Standard." Thesis, NURE, MC&FPGA, 2019. https://mcfpga.nure.ua/conf/2019-mcfpga/10-35598-mcfpga-2019-014.
Testo completoGreinsmark, Carl. "Ransomware." Thesis, Högskolan Kristianstad, Fakulteten för naturvetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hkr:diva-20695.
Testo completoSamuel, David. "RFID security in door locks." Thesis, Linköping University, Department of Computer and Information Science, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-12186.
Testo completoManteena, Rajender. "A VHDL Implemetation of the Advanced Encryption Standard-Rijndael Algorithm." Scholar Commons, 2004. https://scholarcommons.usf.edu/etd/1149.
Testo completoKundur, Abhinay. "Digital and Analog Signal Encryption and Decryption in Mid RF Range Using Hybrid Acousto-Optic Chaos." University of Dayton / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=dayton1336100009.
Testo completoLibri sul tema "Decryption"
Martínez-Guerra, Rafael, Juan Javier Montesinos-García, and Juan Pablo Flores-Flores. Encryption and Decryption Algorithms for Plain Text and Images using Fractional Calculus. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-20698-6.
Testo completoPaulus, Max. Der Diskos von Phaistos: Ein Ansatz zu seiner Entschlüsselung / = The Phaistos disk : an approach to its decryption. 2nd ed. Hamburg: Verlag Dr. Kovac, 2017.
Cerca il testo completoPaulus, Max. Der Diskos von Phaistos: Ein Ansatz zu seiner Entschlüsselung = The Phaistos disk : an approach to its decryption. Hamburg: Kovac, 2014.
Cerca il testo completoMuniraj, Inbarasan, and John T. Sheridan. Optical Encryption and Decryption. SPIE, 2019. http://dx.doi.org/10.1117/3.2523506.
Testo completoCapitoli di libri sul tema "Decryption"
Weik, Martin H. "decryption." In Computer Science and Communications Dictionary, 372. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_4547.
Testo completoKaliski, Burt. "Decryption Exponent." In Encyclopedia of Cryptography and Security, 322. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_400.
Testo completoMu, Yi, Vijay Varadharajan, and Khan Quac Nguyen. "Delegated Decryption." In Cryptography and Coding, 258–69. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-46665-7_30.
Testo completoKaliski, Burt. "Decryption Exponent." In Encyclopedia of Cryptography, Security and Privacy, 605–6. Cham: Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-030-71522-9_400.
Testo completoRyan, Mark D. "Making Decryption Accountable." In Security Protocols XXV, 93–98. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-71075-4_11.
Testo completoGreen, Matthew. "Secure Blind Decryption." In Public Key Cryptography – PKC 2011, 265–82. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-19379-8_16.
Testo completoHassan, Nihad A. "Ransomware Decryption Tools." In Ransomware Revealed, 191–201. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4255-1_8.
Testo completoKävrestad, Joakim. "Decryption and Password Enforcing." In Fundamentals of Digital Forensics, 39–46. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-96319-8_5.
Testo completoKävrestad, Joakim. "Decryption and Password Enforcing." In Fundamentals of Digital Forensics, 47–55. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-38954-3_5.
Testo completoOhta, Kazuo. "Remarks on blind decryption." In Lecture Notes in Computer Science, 109–15. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/bfb0030413.
Testo completoAtti di convegni sul tema "Decryption"
Mishra, Shreshtha, Ojusav Agarwal, and Sunil Kumar Patel. "Quantum Decryption using Shor’s Algorithm." In 2024 IEEE Pune Section International Conference (PuneCon), 1–6. IEEE, 2024. https://doi.org/10.1109/punecon63413.2024.10895777.
Testo completoShah, Aaryak, Alok Kumar Kamal, and Neeraj. "Steganographic Encryption and Decryption Using Duality Preserving GANs." In 2024 IEEE 22nd International Conference on Industrial Informatics (INDIN), 1–5. IEEE, 2024. https://doi.org/10.1109/indin58382.2024.10774348.
Testo completoKuppan, Ajith Kumar, Raviraj Bhat, and Uday Trivedi. "QUIC SNI decryption usefulness prediction using Machine Learning." In 2024 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT), 1–6. IEEE, 2024. http://dx.doi.org/10.1109/conecct62155.2024.10677263.
Testo completoV, Thanikaiselvan, Abilash P, Lingeswar C, Sathya P, Kaviya K, Subashanthini S, and Rengarajan Amirtharajan. "Chaotic Audio Encryption and Decryption Using Logistic Map." In 2024 IEEE International Conference on Automatic Control and Intelligent Systems (I2CACIS), 346–51. IEEE, 2024. http://dx.doi.org/10.1109/i2cacis61270.2024.10649629.
Testo completoAmano, Hodaka, Keiji Shimada, Reika Suketomo, Ryosuke Matsumoto, and Takahiro Kodama. "Impact of AES-CTR Mode Modified QAM Symbol Block Cipher on Nonlinear Fiber-Optic Channels." In CLEO: Science and Innovations, STh3Q.2. Washington, D.C.: Optica Publishing Group, 2024. http://dx.doi.org/10.1364/cleo_si.2024.sth3q.2.
Testo completoMatsumoto, Ryosuke, and Takahiro Kodama. "High-Speed Quantum Noise Stream Cipher System Enabled by Optical Fiber-based Encryption and Low-Complexity Digital Decryption." In CLEO: Science and Innovations, STh3Q.1. Washington, D.C.: Optica Publishing Group, 2024. http://dx.doi.org/10.1364/cleo_si.2024.sth3q.1.
Testo completoZivic, Natasa, Esad Kadusic, and Mirko Skrbic. "Mathematical optimization of decrypting algorithm for soft input decryption." In 2009 XXII International Symposium on Information, Communication and Automation Technologies (ICAT 2009). IEEE, 2009. http://dx.doi.org/10.1109/icat.2009.5348411.
Testo completoMüller, Jens, Fabian Ising, Vladislav Mladenov, Christian Mainka, Sebastian Schinzel, and Jörg Schwenk. "Practical Decryption exFiltration." In CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3319535.3354214.
Testo completoKalaichelvi, V., and R. M. Chandrasekaran. "FSPAlgorithm for encryption/decryption." In 2008 International Conference on Computing, Communication and Networking (ICCCN). IEEE, 2008. http://dx.doi.org/10.1109/icccnet.2008.4787779.
Testo completoGahi, Youssef, Farid Bourennani, Mouhcine Guennoun, and Hussein T. Mouftah. "Blind decryption for cloud computing." In 2016 IEEE Symposium on Computers and Communication (ISCC). IEEE, 2016. http://dx.doi.org/10.1109/iscc.2016.7543875.
Testo completoRapporti di organizzazioni sul tema "Decryption"
Negron, Melvin S. Study of the Hill Cipher Encryption/Decryption Algorithm. Fort Belvoir, VA: Defense Technical Information Center, April 2012. http://dx.doi.org/10.21236/ada581720.
Testo completoDolmatov, V., ed. GOST 28147-89: Encryption, Decryption, and Message Authentication Code (MAC) Algorithms. RFC Editor, March 2010. http://dx.doi.org/10.17487/rfc5830.
Testo completoFedoseev, O. N. Calculation of the coverage area based on GOOGLE EARTH satellite images (MAP PIXEL-decryption V1.1 ). Ailamazyan Program Systems Institute of Russian Academy of Sciences, January 2024. http://dx.doi.org/10.12731/ofernio.2023.25277.
Testo completoEverett, Martin. EU–US collaboration on quantum technologies. Royal Institute of International Affairs, January 2021. http://dx.doi.org/10.55317/9781784134211.
Testo completovon Luckner, Clemens Graf, Carmen Reinhart, and Kenneth Rogoff. Decrypting New Age International Capital Flows. Cambridge, MA: National Bureau of Economic Research, October 2021. http://dx.doi.org/10.3386/w29337.
Testo completo