Articoli di riviste sul tema "Decryption"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "Decryption".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.
Partala, Juha. "Symmetric Blind Decryption with Perfect Secrecy". Journal of Computer Networks and Communications 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/6575907.
Testo completoZheng, Ting, e Zhi Zhong Zhang. "A Method Based on Hash Table to Implement the NAS Layer Decryption in LTE Big Data Platform". Applied Mechanics and Materials 716-717 (dicembre 2014): 1430–33. http://dx.doi.org/10.4028/www.scientific.net/amm.716-717.1430.
Testo completoBrygilevych, Volodymyr, Nazar Pelypets e Vasyl Rabyk. "Encryption of text messages using multilayer neural networks". Computational Problems of Electrical Engineering 10, n. 2 (2 dicembre 2020): 1–6. http://dx.doi.org/10.23939/jcpee2020.02.001.
Testo completoPopescu, Narcis I., Cristina Lupu e Florea Lupu. "Calcium Ionophore-Induced Tissue Factor (TF) Decryption Induces TF Immobilization Into Lipid Rafts and Negative Regulation of TF Procoagulant Activity." Blood 116, n. 21 (19 novembre 2010): 1131. http://dx.doi.org/10.1182/blood.v116.21.1131.1131.
Testo completoSafitri, Sukmawati Indah, Muhammad Khudzaifah e Mohammad Nafie Jauhari. "Penyandian Pesan Hybrid dengan Myszkowski Cipher dan Rivest, Shamir, Adleman (RSA)". Jurnal Riset Mahasiswa Matematika 2, n. 6 (1 settembre 2023): 214–20. http://dx.doi.org/10.18860/jrmm.v2i6.22017.
Testo completoPatil, Vedika, Sakshi Jain e Yogita Shah. "Secure Cryptography by Using Hash Application". Journal of Cyber Security in Computer System 1, n. 1 (11 maggio 2022): 18–24. http://dx.doi.org/10.46610/jcscs.2022.v01i01.002.
Testo completoIrwanto, Dola. "File Encryption and Decryption Using Algorithm Aes-128 Bit Based Website". MALCOM: Indonesian Journal of Machine Learning and Computer Science 4, n. 2 (1 aprile 2024): 670–77. http://dx.doi.org/10.57152/malcom.v4i2.1305.
Testo completoWadehra, Shivangi, Shivam Goel e Nidhi Sengar. "AES Algorithm: Encryption and Decryption". International Journal of Trend in Scientific Research and Development Volume-2, Issue-3 (30 aprile 2018): 1075–77. http://dx.doi.org/10.31142/ijtsrd11221.
Testo completoLiu, Bao Long, Hua Chen e Yi Guo. "Encrypted XML Data Query Processing with Range Query". Applied Mechanics and Materials 65 (giugno 2011): 241–45. http://dx.doi.org/10.4028/www.scientific.net/amm.65.241.
Testo completoNovianti, Chofifah Alfin, Muhammad Khudzaifah e Mohammad Nafie Jauhari. "Kriptografi Hibrida Cipher Block Chaining (CBC) dan Merkle-Hellman Knapsack untuk Pengamanan Pesan Teks". Jurnal Riset Mahasiswa Matematika 3, n. 1 (31 ottobre 2023): 10–25. http://dx.doi.org/10.18860/jrmm.v3i1.22292.
Testo completoBalasubramanian, Dr Kannan, M. Arun e Dr K. R. Sekar. "An Improved RSA Algorithm for Enhanced Security". Indian Journal of Cryptography and Network Security 2, n. 2 (30 novembre 2022): 1–4. http://dx.doi.org/10.54105/ijcns.b1421.112222.
Testo completoLee, Sang-Un, e Myeong-Bok Choi. "Integer Factorization for Decryption". Journal of the Institute of Webcasting, Internet and Telecommunication 13, n. 6 (31 dicembre 2013): 221–28. http://dx.doi.org/10.7236/jiibc.2013.13.6.221.
Testo completoCeruzzi, P. "Decryption Day by Day". Science 264, n. 5161 (13 maggio 1994): 990–92. http://dx.doi.org/10.1126/science.264.5161.990.
Testo completoButenas, Saulius, e Jolanta Krudysz-Amblo. "Decryption of tissue factor". Thrombosis Research 129 (maggio 2012): S18—S20. http://dx.doi.org/10.1016/j.thromres.2012.02.022.
Testo completoLevchenko, V., I. Shulga, А. Romanyuk e L. Bezverkha. "USE OF REMOTE GEOINFORMATION TECHNOLOGIES FOR FOREST PATHOLOGY MONITORING IN THE ZHYTOMYR POLISSYA". Innovative Solution in Modern Science 2, n. 38 (30 marzo 2020): 20. http://dx.doi.org/10.26886/2414-634x.2(38)2020.3.
Testo completoAbu-Faraj, Mua’ad, Abeer Al-Hyari e Ziad Alqadi. "A DUAL APPROACH TO DIGITAL AUDIO SIGNAL CRYPTOGRAPHY". Journal of Southwest Jiaotong University 57, n. 1 (28 febbraio 2022): 24–33. http://dx.doi.org/10.35741/issn.0258-2724.57.1.3.
Testo completoGao, Ming Hu, e Hong Yuan Huang. "A New Efficient Variant of the Batch RSA Cryptosystem". Advanced Materials Research 756-759 (settembre 2013): 2660–62. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.2660.
Testo completoRuan, Wei Hua, e Qing Sheng Hu. "A Kind of Logarithmic Function Hardware Encryptor and Decryptor". Applied Mechanics and Materials 427-429 (settembre 2013): 2956–59. http://dx.doi.org/10.4028/www.scientific.net/amm.427-429.2956.
Testo completoGao, Ronghai, Jiwen Zeng e Lunzhi Deng. "An efficient certificateless multi-receiver threshold decryption scheme". RAIRO - Theoretical Informatics and Applications 53, n. 1-2 (gennaio 2019): 67–84. http://dx.doi.org/10.1051/ita/2019001.
Testo completoVagizov, M. R., S. Y. Stepanov, Y. A. Petrov e A. Y. Sidorenko. "Method of decryption and inventory of forest plantations by means of GIS AutoCad Map". Geoinformatika, n. 4 (2020): 20–27. http://dx.doi.org/10.47148/1609-364x-2020-4-20-27.
Testo completoSong, Qinghua, Samira Khadir, Stéphane Vézian, Benjamin Damilano, Philippe de Mierry, Sébastien Chenot, Virginie Brandli, Romain Laberdesque, Benoit Wattellier e Patrice Genevet. "Printing polarization and phase at the optical diffraction limit: near- and far-field optical encryption". Nanophotonics 10, n. 1 (27 luglio 2020): 697–704. http://dx.doi.org/10.1515/nanoph-2020-0352.
Testo completoChiriac, Liubomir, Aurel Danilov e Violeta Bogdanova. "Encryption and decryption algorithm based on the Latin groupoid isotopes". Acta et commentationes Ştiinţe Exacte şi ale Naturii 14, n. 2 (dicembre 2022): 117–31. http://dx.doi.org/10.36120/2587-3644.v14i2.117-131.
Testo completoPronika, Pronika, e S. S. Tyagi. "Performance analysis of encryption and decryption algorithm". Indonesian Journal of Electrical Engineering and Computer Science 23, n. 2 (1 agosto 2021): 1030. http://dx.doi.org/10.11591/ijeecs.v23.i2.pp1030-1038.
Testo completoBrovets, Andrey I. "The deciphering stimulus of a compound word: the problem of definition and description". Russian Language Studies 17, n. 4 (15 dicembre 2019): 487–501. http://dx.doi.org/10.22363/2618-8163-2019-17-4-487-501.
Testo completoZhang, Kai, Yanping Li, Yun Song, Laifeng Lu, Tao Zhang e Qi Jiang. "A Traceable and Revocable Multiauthority Attribute-Based Encryption Scheme with Fast Access". Security and Communication Networks 2020 (22 dicembre 2020): 1–14. http://dx.doi.org/10.1155/2020/6661243.
Testo completoChen, Chao, Hongying Zhang e Bin Wu. "Image Encryption Based on Arnod Transform and Fractional Chaotic". Symmetry 14, n. 1 (17 gennaio 2022): 174. http://dx.doi.org/10.3390/sym14010174.
Testo completoAl-Fayoumi, Mohammed, e Sttar Aboud. "Blind Decryption and Privacy Protection". American Journal of Applied Sciences 2, n. 4 (1 aprile 2005): 873–76. http://dx.doi.org/10.3844/ajassp.2005.873.876.
Testo completoHewage, Chaminda, Ambikesh Jayal, Glenn Jenkins e Ryan J. Brown. "A Learned Polyalphabetic Decryption Cipher". SNE Simulation Notes Europe 28, n. 4 (dicembre 2018): 141–48. http://dx.doi.org/10.11128/sne.28.tn.10441.
Testo completoSIROMONEY, RANI, K. G. SUBRAMANIAN e P. J. ABISHA. "ENCRYPTION-DECRYPTION TECHNIQUES FOR PICTURES". International Journal of Pattern Recognition and Artificial Intelligence 03, n. 03n04 (dicembre 1989): 497–503. http://dx.doi.org/10.1142/s0218001489000371.
Testo completoCheatham, Tom. "MESSAGE DECRYPTION AND SPELLING CHECKERS". Cryptologia 11, n. 2 (aprile 1987): 115–18. http://dx.doi.org/10.1080/0161-118791861901.
Testo completoEncinas, L. Hernández, J. Muñoz Masqué e A. Queiruga Dios. "Large decryption exponents in RSA". Applied Mathematics Letters 16, n. 3 (aprile 2003): 293–95. http://dx.doi.org/10.1016/s0893-9659(03)80046-0.
Testo completoMillen, Jonathan. "On the freedom of decryption". Information Processing Letters 86, n. 6 (giugno 2003): 329–33. http://dx.doi.org/10.1016/s0020-0190(03)00211-4.
Testo completoRao, L. Vijaya Mohan. "Tissue factor mechanisms of decryption". Frontiers in Bioscience E4, n. 4 (2012): 1513–27. http://dx.doi.org/10.2741/e477.
Testo completoDevi, SistlaVasundhara, e Harika Devi Kotha. "AES encryption and decryption standards". Journal of Physics: Conference Series 1228 (maggio 2019): 012006. http://dx.doi.org/10.1088/1742-6596/1228/1/012006.
Testo completoNayak, Nikhilesh, Akshay Chandak, Nisarg Shah e B. Karthikeyan. "Encryption and decryption using FPGA". IOP Conference Series: Materials Science and Engineering 263 (novembre 2017): 052030. http://dx.doi.org/10.1088/1757-899x/263/5/052030.
Testo completoBhargava, Puvvula, e Kuppam Hari Kishan. "144-BIT Encryption/Decryption Technique". International Journal of Computer Applications 1, n. 21 (25 febbraio 2010): 67–74. http://dx.doi.org/10.5120/53-647.
Testo completoRathi, Amit, Raj Saini, Abhinav Mishra, Vivek Kumar Sharma e Jagbeer Singh. "File Encryption and Decryption Software". Journal of Computer Based Parallel Programming 8, n. 1 (19 aprile 2023): 5–13. http://dx.doi.org/10.46610/jocpp.2023.v08i01.002.
Testo completoLadda, Priyanka, Shyama Yadav e Shashank Vyas. "Decryption and Encryption of Data". Journal of Nonlinear Analysis and Optimization 14, n. 01 (2023): 86–93. http://dx.doi.org/10.36893/jnao.2023.v14i1.087-093.
Testo completoKumar, Dilip, Manoj Kumar e Gaurav Gupta. "An Outsourced Decryption ABE Model using ECC in Internet of Things". International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 29, n. 06 (dicembre 2021): 949–64. http://dx.doi.org/10.1142/s0218488521500422.
Testo completoQiao, Huidong, Jiangchun Ren, Zhiying Wang e Ying Hu. "Disabling Tracing in Black-Box-Traceable CP-ABE System: Alert Decryption Black Box". Symmetry 16, n. 1 (28 dicembre 2023): 37. http://dx.doi.org/10.3390/sym16010037.
Testo completoYadav,, Sandarbh. "AES 128 Bit Optimization: High-Speed and Area-Efficient through Loop Unrolling". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, n. 05 (2 giugno 2024): 1–5. http://dx.doi.org/10.55041/ijsrem35342.
Testo completoFlynn, Sofia. "An Investigation Into the Mathematics of Decryption Techniques in RSA Encryption, With an Implementation in Python". Spring 2021, n. 2 (31 luglio 2021): 6–18. http://dx.doi.org/10.48091/gsr.v1i2.18.
Testo completoL, Vinothkumar, e Balaji V. "Encryption and Decryption Technique Using Matrix Theory". Journal of Computational Mathematica 3, n. 2 (30 dicembre 2019): 1–7. http://dx.doi.org/10.26524/cm49.
Testo completoTsmots, Ivan, Vasyl Rabyk e Yurii Lukashchuk. "Development of Mobile Facilities of Neuro-like Cryptographic Encryption and Decryption of Data in Real Time". Vìsnik Nacìonalʹnogo unìversitetu "Lʹvìvsʹka polìtehnìka". Serìâ Ìnformacìjnì sistemi ta merežì 9 (10 giugno 2021): 84–95. http://dx.doi.org/10.23939/sisn2021.09.084.
Testo completoWinarno, Agus, e Riri Fitri Sari. "A Novel Secure End-to-End IoT Communication Scheme Using Lightweight Cryptography Based on Block Cipher". Applied Sciences 12, n. 17 (1 settembre 2022): 8817. http://dx.doi.org/10.3390/app12178817.
Testo completoVisconti, Paolo, Ramiro Velazquez, Stefano Capoccia e Roberto De Fazio. "High-performance AES-128 algorithm implementation by FPGA-based SoC for 5G communications". International Journal of Electrical and Computer Engineering (IJECE) 11, n. 5 (1 ottobre 2021): 4221. http://dx.doi.org/10.11591/ijece.v11i5.pp4221-4232.
Testo completoYu, Gang, Xiaoxiao Ma, Zhenfu Cao, Guang Zeng e Wenbao Han. "Accountable CP-ABE with Public Verifiability: How to Effectively Protect the Outsourced Data in Cloud". International Journal of Foundations of Computer Science 28, n. 06 (settembre 2017): 705–23. http://dx.doi.org/10.1142/s0129054117400147.
Testo completoWuttidittachotti, Pongpisit, e Parinya Natho. "Improved ciphertext-policy time using short elliptic curve Diffie–Hellman". International Journal of Electrical and Computer Engineering (IJECE) 13, n. 4 (1 agosto 2023): 4547. http://dx.doi.org/10.11591/ijece.v13i4.pp4547-4556.
Testo completoDhamala, Narayan, e Krishna Prasad Acharya. "A Comparative Analysis of DES, AES and Blowfish Based DNA Cryptography". Adhyayan Journal 11, n. 11 (25 giugno 2024): 69–80. http://dx.doi.org/10.3126/aj.v11i11.67080.
Testo completoLiu, Yonghong. "Group and Cipher in Wormhole and Quantum Entanglement". European Journal of Pure and Applied Mathematics 14, n. 2 (18 maggio 2021): 521–36. http://dx.doi.org/10.29020/nybg.ejpam.v14i2.3972.
Testo completo