Letteratura scientifica selezionata sul tema "Encryption"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Consulta la lista di attuali articoli, libri, tesi, atti di convegni e altre fonti scientifiche attinenti al tema "Encryption".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Articoli di riviste sul tema "Encryption"
Sun, Chenbo. "Comparative Study of RSA Encryption and Quantum Encryption". Theoretical and Natural Science 2, n. 1 (20 febbraio 2023): 121–25. http://dx.doi.org/10.54254/2753-8818/2/20220098.
Testo completoPourasad, Yaghoub, Ramin Ranjbarzadeh e Abbas Mardani. "A New Algorithm for Digital Image Encryption Based on Chaos Theory". Entropy 23, n. 3 (13 marzo 2021): 341. http://dx.doi.org/10.3390/e23030341.
Testo completoThabit, Zainab Hasan, Sadiq A. Mehdi e Bashar M. Nema. "Enhancing Color Image Security: Encryption with Dynamic Chaotic Three-Dimensional System and Robust Security Analysis". Al-Mustansiriyah Journal of Science 34, n. 4 (30 dicembre 2023): 87–95. http://dx.doi.org/10.23851/mjs.v34i4.1411.
Testo completoEt. al., Jaichandran R,. "A Hybrid Encryption Model with Attribute Based Encryption and Advanced Encryption Standard Techniques". Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, n. 2 (11 aprile 2021): 334–36. http://dx.doi.org/10.17762/turcomat.v12i2.720.
Testo completoAlawi, Attaa R., e Nidaa F. Hassan. "A Proposal Video Encryption Using Light Stream Algorithm". Engineering and Technology Journal 39, n. 1B (25 marzo 2021): 184–96. http://dx.doi.org/10.30684/etj.v39i1b.1689.
Testo completoZhu, Bingxin, Puwen Wei e Mingqiang Wang. "Adaptive Security of Broadcast Encryption, Revisited". Security and Communication Networks 2017 (2017): 1–16. http://dx.doi.org/10.1155/2017/1404279.
Testo completoZhang, Jian, e Yutong Zhang. "An Image Encryption Algorithm Based on Balanced Pixel and Chaotic Map". Mathematical Problems in Engineering 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/216048.
Testo completoNori, Ahmed S., e Ansam O. Abdulmajeed. "Design and implementation of Threefish cipher algorithm in PNG file". Sustainable Engineering and Innovation 3, n. 2 (29 maggio 2021): 79–91. http://dx.doi.org/10.37868/sei.v3i2.id131.
Testo completoAlslman, Yasmeen, Eman Alnagi, Ashraf Ahmad, Yousef AbuHour, Remah Younisse e Qasem Abu Al-haija. "Hybrid Encryption Scheme for Medical Imaging Using AutoEncoder and Advanced Encryption Standard". Electronics 11, n. 23 (30 novembre 2022): 3967. http://dx.doi.org/10.3390/electronics11233967.
Testo completoAli Pitchay, Sakinah, Wail Abdo Ali Alhiagem, Farida Ridzuan e Sundresan Perumal. "Mobile Application Design for Protecting the Data in Cloud Using Enhanced Technique of Encryption". International Journal of Engineering & Technology 7, n. 4.15 (7 ottobre 2018): 98. http://dx.doi.org/10.14419/ijet.v7i4.15.21427.
Testo completoTesi sul tema "Encryption"
Yilmaz, Fatih Levent. "Video Encryption". Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-12604.
Testo completoAkdag, Sadik Bahaettin. "An Image Encryption Algorithm Robust To Post-encryption Bitrate Conversion". Master's thesis, METU, 2006. http://etd.lib.metu.edu.tr/upload/12607710/index.pdf.
Testo completoMeissner, Robert. "Data Encryption Standard". Universitätsbibliothek Chemnitz, 2002. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-200200590.
Testo completoSt-Jules, Michael. "Secure Quantum Encryption". Thesis, Université d'Ottawa / University of Ottawa, 2016. http://hdl.handle.net/10393/35371.
Testo completoFauzi, Prastudy. "On Fully Homomorphic Encryption". Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2012. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-18992.
Testo completoTopsholm, Max. "Transactional Data Encryption View". Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-147885.
Testo completoWang, Yongsheng. "Advanced video encryption techniques". Thesis, Queen's University Belfast, 2013. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.602966.
Testo completoKing, Kevin C. "Optimizing fully homomorphic encryption". Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/113156.
Testo completoThis electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 50-51).
Fully homomorphic encryption (FHE) presents the possibility of removing the need to trust cloud providers with plaintext data. We present two new FHE scheme variants of BGV'12, both of which remove the need for key switching after a ciphertext multiplication, overall halving the runtime of bootstrapping. We also present multiple implementations of 32-bit integer addition evaluation, the fastest of which spends 16 seconds computing the addition circuit and 278 seconds bootstrapping. We nd that bootstrapping consumes approximately 90% of the computation time for integer addition and secure parameter settings are currently bottlenecked by the memory size of commodity hardware.
by Kevin C. King.
M. Eng.
Banu, Pokhali Sayeda Roohi. "Satellite on-board encryption". Thesis, University of Surrey, 2007. http://epubs.surrey.ac.uk/774244/.
Testo completoAnicama, Jorge. "Prime numbers and encryption". Pontificia Universidad Católica del Perú, 2014. http://repositorio.pucp.edu.pe/index/handle/123456789/95565.
Testo completoLibri sul tema "Encryption"
Ahmad, Khairol Amali Bin, Khaleel Ahmad e Uma N. Dulhare, a cura di. Functional Encryption. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-60890-3.
Testo completoWheeler, David. Block encryption. Cambridge: University of Cambridge Computer Laboratory, 1987.
Cerca il testo completoRen, Kui, e Cong Wang. Searchable Encryption. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-21377-9.
Testo completoFatal encryption. Port Moody, B.C: Gypsy Moon Press, 2008.
Cerca il testo completoKoç, Çetin Kaya, Funda Özdemir e Zeynep Ödemiş Özger. Partially Homomorphic Encryption. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-87629-6.
Testo completoBiryukov, Alex, a cura di. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-74619-5.
Testo completoCanteaut, Anne, a cura di. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34047-5.
Testo completoLeander, Gregor, a cura di. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-48116-5.
Testo completoPreneel, Bart, a cura di. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 1995. http://dx.doi.org/10.1007/3-540-60590-8.
Testo completoGollmann, Dieter, a cura di. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 1996. http://dx.doi.org/10.1007/3-540-60865-6.
Testo completoCapitoli di libri sul tema "Encryption"
Krähenbühl, Cyrill, e Adrian Perrig. "Searchable Symmetric Encryption". In Trends in Data Protection and Encryption Technologies, 71–75. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_14.
Testo completoBuchanan, W. J. "Encryption". In The Complete Handbook of the Internet, 731–57. Boston, MA: Springer US, 2002. http://dx.doi.org/10.1007/978-0-306-48331-8_35.
Testo completoCarter, Peter A. "Encryption". In Pro SQL Server 2019 Administration, 371–408. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5089-1_11.
Testo completoMustafa, Osama, e Robert P. Lockard. "Encryption". In Oracle Database Application Security, 1–45. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5367-0_1.
Testo completoNatarajan, Jay, Rudi Bruchez, Scott Shaw e Michael Coles. "Encryption". In Pro T-SQL 2012 Programmer’s Guide, 179–203. Berkeley, CA: Apress, 2012. http://dx.doi.org/10.1007/978-1-4302-4597-1_7.
Testo completoSpendolini, Scott. "Encryption". In Expert Oracle Application Express Security, 247–63. Berkeley, CA: Apress, 2013. http://dx.doi.org/10.1007/978-1-4302-4732-6_14.
Testo completoCebollero, Miguel, Jay Natarajan e Michael Coles. "Encryption". In Pro T-SQL Programmer's Guide, 207–32. Berkeley, CA: Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-0145-9_8.
Testo completoCarter, Peter A. "Encryption". In Pro SQL Server Administration, 317–39. Berkeley, CA: Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-0710-9_10.
Testo completoAitchison, Alastair, e Adam Machanic. "Encryption". In Expert SQL Server 2008 Development, 121–58. Berkeley, CA: Apress, 2009. http://dx.doi.org/10.1007/978-1-4302-7212-0_6.
Testo completoBuchmann, Johannes A. "Encryption". In Introduction to Cryptography, 69–101. New York, NY: Springer US, 2001. http://dx.doi.org/10.1007/978-1-4684-0496-8_3.
Testo completoAtti di convegni sul tema "Encryption"
Gao, Haiying, e Chao Ma. "An Adaptively Secure NIPE Scheme based on DCR Assumption". In 9th International Conference on Artificial Intelligence and Applications (AIAPP 2022). Academy and Industry Research Collaboration Center (AIRCC), 2022. http://dx.doi.org/10.5121/csit.2022.120914.
Testo completoM. GHADI, Dua. "MODIFICATION OF ELGAMAL ELLIPTIC CURVE CRYPTOSYSTEM ALGORITHM". In VI.International Scientific Congress of Pure,Applied and Technological Sciences. Rimar Academy, 2022. http://dx.doi.org/10.47832/minarcongress6-8.
Testo completoPiper, F. "Encryption". In European Conference on Security and Detection - ECOS97 Incorporating the One Day Symposium on Technology Used for Combatting Fraud. IEE, 1997. http://dx.doi.org/10.1049/cp:19970422.
Testo completoHashizume, Keiko, e Eduardo B. Fernandez. "Symmetric encryption and XML encryption patterns". In the 16th Conference. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1943226.1943243.
Testo completoCai, Xiantao, Weidong Li e Fazhi He. "Partial Encryption Based Secure Sharing of CAD Models for Cloud-Based Design". In ASME 2014 International Manufacturing Science and Engineering Conference collocated with the JSME 2014 International Conference on Materials and Processing and the 42nd North American Manufacturing Research Conference. American Society of Mechanical Engineers, 2014. http://dx.doi.org/10.1115/msec2014-4079.
Testo completoWang, Y. "A data encryption scheme combined symmetric encryption algorithm with asymmetric encryption algorithm". In 5th International Conference on Artificial Intelligence and Advanced Manufacturing (AIAM 2023). Institution of Engineering and Technology, 2023. http://dx.doi.org/10.1049/icp.2023.2981.
Testo completohuang, haomin, Jing Song, Zhijia Xu, Xiaoke Ding e Wei Deng. "Vehicle security encryption based on unlicensed encryption". In Other Applications. SPIE, 2018. http://dx.doi.org/10.1117/12.2284465.
Testo completoBellafqira, Reda, Gouenou Coatrieux, Dalel Bouslimi, Gwénolé Quellec e Michel Cozic. "Proxy Re-Encryption Based on Homomorphic Encryption". In ACSAC 2017: 2017 Annual Computer Security Applications Conference. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3134600.3134616.
Testo completoMalladar, Rohit, e Sanjeev Kunte. "Selective video encryption using Sattolo's encryption technique". In 2016 International Conference on Electrical, Electronics, Communication, Computer and Optimization Techniques (ICEECCOT). IEEE, 2016. http://dx.doi.org/10.1109/iceeccot.2016.7955228.
Testo completoS, Rohini, e Gini R. "Efficient Unpredictable Multi Authority Attribute based Encryption". In The International Conference on scientific innovations in Science, Technology, and Management. International Journal of Advanced Trends in Engineering and Management, 2023. http://dx.doi.org/10.59544/ukgh4577/ngcesi23p17.
Testo completoRapporti di organizzazioni sul tema "Encryption"
Karri, Ramesh, Ozgur Sinanoglu e Jeyavihayan Rajendran. Logic Encryption. Fort Belvoir, VA: Defense Technical Information Center, febbraio 2014. http://dx.doi.org/10.21236/ada595228.
Testo completoRaeburn, K. Advanced Encryption Standard (AES) Encryption for Kerberos 5. RFC Editor, febbraio 2005. http://dx.doi.org/10.17487/rfc3962.
Testo completoHarkins, D., e W. Kumari, a cura di. Opportunistic Wireless Encryption. RFC Editor, marzo 2017. http://dx.doi.org/10.17487/rfc8110.
Testo completoTs'o, T. Telnet Data Encryption Option. RFC Editor, settembre 2000. http://dx.doi.org/10.17487/rfc2946.
Testo completoPark, J., S. Lee, J. Kim e J. Lee. The SEED Encryption Algorithm. RFC Editor, febbraio 2005. http://dx.doi.org/10.17487/rfc4009.
Testo completoLee, H. J., S. J. Lee, J. H. Yoon, D. H. Cheon e J. I. Lee. The SEED Encryption Algorithm. RFC Editor, dicembre 2005. http://dx.doi.org/10.17487/rfc4269.
Testo completoJohnson, Karen L. Semaphore Network Encryption Report. Fort Belvoir, VA: Defense Technical Information Center, marzo 1994. http://dx.doi.org/10.21236/ada279294.
Testo completoCoward, John R. Computational Complexity and Encryption. Fort Belvoir, VA: Defense Technical Information Center, febbraio 1995. http://dx.doi.org/10.21236/ada291910.
Testo completoJones, M., e J. Hildebrand. JSON Web Encryption (JWE). RFC Editor, maggio 2015. http://dx.doi.org/10.17487/rfc7516.
Testo completoBarnes, R., K. Bhargavan, B. Lipp e C. Wood. Hybrid Public Key Encryption. RFC Editor, febbraio 2022. http://dx.doi.org/10.17487/rfc9180.
Testo completo