Artykuły w czasopismach na temat „Advanced cryptographic techniques”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Advanced cryptographic techniques”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Abudalou, Mohammad. "Enhancing Data Security through Advanced Cryptographic Techniques". International Journal of Computer Science and Mobile Computing 13, nr 1 (30.01.2024): 88–92. http://dx.doi.org/10.47760/ijcsmc.2024.v13i01.007.
Pełny tekst źródłaKarantjias, Athanasios, i Nineta Polemi. "Assessment of advanced cryptographic antiviral techniques". International Journal of Electronic Security and Digital Forensics 3, nr 1 (2010): 60. http://dx.doi.org/10.1504/ijesdf.2010.032331.
Pełny tekst źródłaViresh, Kasheenath Babaleshwar, Karade Sinchana, N. Sakshi i Naidu Anush. "Audio encryption and decryption using AES algorithm technique". i-manager’s Journal on Electronics Engineering 14, nr 2 (2024): 8. http://dx.doi.org/10.26634/jele.14.2.20486.
Pełny tekst źródłaLewis, Nehama, Yaron Connelly, Gil Henkin, Max Leibovich i Adi Akavia. "Factors Influencing the Adoption of Advanced Cryptographic Techniques for Data Protection of Patient Medical Records". Healthcare Informatics Research 28, nr 2 (30.04.2022): 132–42. http://dx.doi.org/10.4258/hir.2022.28.2.132.
Pełny tekst źródłaHieu, Phan Duong, i Moti Yung. "PRIVACY IN ADVANCED CRYPTOGRAPHIC PROTOCOLS: PROTOTYPICAL EXAMPLES". Journal of Computer Science and Cybernetics 37, nr 4 (12.10.2021): 429–51. http://dx.doi.org/10.15625/1813-9663/37/4/16104.
Pełny tekst źródłaMalhotra, Anoushka, Ashwin Arora i Dr Manjot Kaur Bhatia. "Symmetric Cryptographic Approaches". International Journal for Research in Applied Science and Engineering Technology 10, nr 12 (31.12.2022): 718–21. http://dx.doi.org/10.22214/ijraset.2022.47982.
Pełny tekst źródłaSingh, Sukhveer. "Investigation of Cryptography for Secure Communication and Data Privacy Applications". Mathematical Statistician and Engineering Applications 70, nr 1 (31.01.2021): 551–60. http://dx.doi.org/10.17762/msea.v70i1.2508.
Pełny tekst źródłaMark Espalmado, John, i Edwin Arboleda. "DARE Algorithm: A New Security Protocol by Integration of Different Cryptographic Techniques". International Journal of Electrical and Computer Engineering (IJECE) 7, nr 2 (1.04.2017): 1032. http://dx.doi.org/10.11591/ijece.v7i2.pp1032-1041.
Pełny tekst źródłaFeilu Hang, Et al. "Design Of Intelligent Countermeasure System for Power System Network Security Defense". Journal of Electrical Systems 19, nr 4 (25.01.2024): 227–40. http://dx.doi.org/10.52783/jes.635.
Pełny tekst źródłaParthasarathy, Rajamohan, Seow Soon Loong i Preethy Ayyappan. "An Efficient Encryption Implementation Using AES Algorithm Techniques". Journal of Engineering & Technological Advances 3, nr 1 (2018): 61–70. http://dx.doi.org/10.35934/segi.v3i1.61.
Pełny tekst źródłaR, Mr Suresh. "A Survey on Quantum-Cryptographic Image Encryption for Secure Storage". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, nr 04 (3.04.2024): 1–5. http://dx.doi.org/10.55041/ijsrem29461.
Pełny tekst źródłaSundararajan, Ananiah Durai Durai, i Rajashree R. "A Comprehensive Survey on Lightweight Asymmetric Key Cryptographic Algorithm for Resource Constrained Devices". ECS Transactions 107, nr 1 (24.04.2022): 7457–68. http://dx.doi.org/10.1149/10701.7457ecst.
Pełny tekst źródłaAnkita Srivastava. "Performance Evaluation of Genetic Algorithm-Driven Blockchain Encryption for EHR Management and Validation". Journal of Electrical Systems 20, nr 7s (4.05.2024): 1726–39. http://dx.doi.org/10.52783/jes.3773.
Pełny tekst źródłaSultan, Abid, Yao Lin i Azhar Mushtaq. "A Survey Paper on ASCII-Based Cryptographic Techniques". Vol 4 Issue 4 4, nr 4 (17.12.2022): 1087–98. http://dx.doi.org/10.33411/ijist/2022040411.
Pełny tekst źródłaWaheed, Adil, Fazli Subhan, Mazliham Mohd Suud, Muhammad Yasir Hayat Malik, Alina Mirza i Farkhanda Afzal. "Construction of nonlinear component of block cipher using coset graph". AIMS Mathematics 8, nr 9 (2023): 21644–67. http://dx.doi.org/10.3934/math.20231104.
Pełny tekst źródłaAbdElminaam, DiaaSalama, Hatem M. Abdul Kader, Mohie M. Hadhoud i Salah M. El-Sayed. "Developing and Evaluation of New Hybrid Encryption Algorithms". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 13, nr 1 (28.03.2014): 4038–52. http://dx.doi.org/10.24297/ijct.v13i1.2926.
Pełny tekst źródłaParenreng, Jumadi Mabe, Sahraeni Maulida Mustari i Abdul Wahid. "E-mail Security System Using El-Gamal Hybrid Algorithm and AES (Advanced Encryption Standard) Algorithm". Internet of Things and Artificial Intelligence Journal 2, nr 1 (16.02.2022): 1–9. http://dx.doi.org/10.31763/iota.v2i1.510.
Pełny tekst źródłaSai D, Jagadeesh, i Krishnaraj P M. "Cryptographic Interweaving of Messages". International Journal of Data Informatics and Intelligent Computing 2, nr 1 (24.03.2023): 42–50. http://dx.doi.org/10.59461/ijdiic.v2i1.38.
Pełny tekst źródłaLimniotis, Konstantinos. "Cryptography as the Means to Protect Fundamental Human Rights". Cryptography 5, nr 4 (30.11.2021): 34. http://dx.doi.org/10.3390/cryptography5040034.
Pełny tekst źródłaKumar, Dilip, i Manoj Kumar. "Hybrid Cryptographic Approach for Data Security Using Elliptic Curve Cryptography for IoT". International Journal of Computer Network and Information Security 16, nr 2 (8.04.2024): 42–54. http://dx.doi.org/10.5815/ijcnis.2024.02.04.
Pełny tekst źródłaGowda, V. Dankan, D. Palanikkumar, Sajja Suneel, Satish Dekka, T. Thiruvenkadam i K. D. V. Prasad. "Cryptographic image-based data security strategies in wireless sensor networks". Journal of Discrete Mathematical Sciences and Cryptography 27, nr 2 (2024): 293–304. http://dx.doi.org/10.47974/jdmsc-1883.
Pełny tekst źródłaShah, Aayush, Prabhat Mahato i Aadarsh Bhagat. "Enhancing Post-Quantum Cryptography: Exploring Mathematical Foundations and Comparative Analysis of Different Cryptographic Algorithm". International Journal for Research in Applied Science and Engineering Technology 11, nr 8 (31.08.2023): 1626–42. http://dx.doi.org/10.22214/ijraset.2023.55341.
Pełny tekst źródłaLiang, Yuheng. "A research on applications of neural network-based cryptography". Applied and Computational Engineering 14, nr 1 (23.10.2023): 258–64. http://dx.doi.org/10.54254/2755-2721/14/20230798.
Pełny tekst źródłaAdy Putra, Wahyu, Suyanto Suyanto i Muhammad Zarlis. "Performance Analysis Of The Combination Of Advanced Encryption Standard Cryptography Algorithms With Luc For Text Security". SinkrOn 8, nr 2 (6.04.2023): 890–97. http://dx.doi.org/10.33395/sinkron.v8i2.12202.
Pełny tekst źródłaAzhari, Rama, i Agita Nisa Salsabila. "Analyzing the Impact of Quantum Computing on Current Encryption Techniques". IAIC Transactions on Sustainable Digital Innovation (ITSDI) 5, nr 2 (22.02.2024): 148–57. http://dx.doi.org/10.34306/itsdi.v5i2.662.
Pełny tekst źródłaSubbarayudu, Yerragudipadu, Gurram Vijendar Reddy, Merugu Shankar, Mailagani Ven, P. K. Abhilash i Archana Sehgal. "Cipher Craft: Design and Analysis of Advanced Cryptographic Techniques for Secure Communication Systems". MATEC Web of Conferences 392 (2024): 01112. http://dx.doi.org/10.1051/matecconf/202439201112.
Pełny tekst źródłaL, Shammi. "Advancing Privacy and Confidentiality in the Digital Healthcare Era: The Image Encryption Solution". International Journal of Innovative Research in Information Security 10, nr 04 (8.05.2024): 133–38. http://dx.doi.org/10.26562/ijiris.2024.v1004.03.
Pełny tekst źródłaOukili, Soufiane, i Seddik Bri. "Hardware Implementation of AES Algorithm with Logic S-box". Journal of Circuits, Systems and Computers 26, nr 09 (24.04.2017): 1750141. http://dx.doi.org/10.1142/s0218126617501419.
Pełny tekst źródłaOlayah, Fekry, Mohammed Al Yami, Hamad Ali Abosaq, Yahya Ali Abdelrahman Ali, Md Ashraf Siddiqui, Reyazur Rashid Irshad, Samreen Shahwar, Asharul Islam i Rafia Sultana. "An Efficient Lightweight Crypto Security Module for Protecting Data Transmission Through IOT Based Electronic Sensors". Journal of Nanoelectronics and Optoelectronics 19, nr 6 (1.06.2024): 646–57. http://dx.doi.org/10.1166/jno.2024.3609.
Pełny tekst źródłaN, Swaroop KUMAR. "Encryption with DNA: The Manipulation of DNA to Deal with the Cyber Security Attacks". ECS Transactions 107, nr 1 (24.04.2022): 8311–20. http://dx.doi.org/10.1149/10701.8311ecst.
Pełny tekst źródłaNirmala, Endar. "Penerapan Steganografi File Gambar Menggunakan Metode Least Significant Bit (LSB) dan Algoritma Kriptografi Advanced Encryption Standard (AES) Berbasis Android". Jurnal Informatika Universitas Pamulang 5, nr 1 (31.03.2020): 36. http://dx.doi.org/10.32493/informatika.v5i1.4646.
Pełny tekst źródłaAhmad, Ashraf, Yousef AbuHour, Remah Younisse, Yasmeen Alslman, Eman Alnagi i Qasem Abu Al-Haija. "MID-Crypt: A Cryptographic Algorithm for Advanced Medical Images Protection". Journal of Sensor and Actuator Networks 11, nr 2 (13.05.2022): 24. http://dx.doi.org/10.3390/jsan11020024.
Pełny tekst źródłaGowda, V. Dankan, Pratik Gite, Mirzanur Rahman, Kirti Rahul Kadam, G. Manivasagam i K. D. V. Prasad. "Novel approaches to biometric security using enhanced session keys and elliptic curve cryptography". Journal of Discrete Mathematical Sciences and Cryptography 27, nr 2 (2024): 477–88. http://dx.doi.org/10.47974/jdmsc-1884.
Pełny tekst źródłaSobia Sattar. "Cryptographic Compression Techniques along with some Penetrating Attacks and Possible Security Measures". Lahore Garrison University Research Journal of Computer Science and Information Technology 4, nr 2 (25.06.2020): 43–57. http://dx.doi.org/10.54692/lgurjcsit.2020.0402133.
Pełny tekst źródłaChorosinski, Len, Venky Sundaram, Klaus Wolter, Richard Calatayud, Parrish Ralston, Scott Suko, David Fry i Nathanael Ellerhoff. "Supply Chain Hardware Integrity for Electronics Defense (SHIELD) Using Small “Dielets”". International Symposium on Microelectronics 2017, nr 1 (1.10.2017): 000699–704. http://dx.doi.org/10.4071/isom-2017-thp21_112.
Pełny tekst źródłaGosavi, Mr Abhijeet, Mr Sakib Shaikh, Mr Adnan Sayyed, Mr Somesh Sapa, Mr Ayan Shaikh i Prof A. A. Pund. "Enabling Encrypted Cloud Emails with Data Encryption using Advanced Encryption Techniques". International Journal for Research in Applied Science and Engineering Technology 11, nr 6 (30.06.2023): 864–69. http://dx.doi.org/10.22214/ijraset.2023.53709.
Pełny tekst źródłaBuddha, Govind Prasad. "Leveraging Cryptographic Hash Functions for Credit Card Fraud Detection". International Journal of Recent Technology and Engineering (IJRTE) 13, nr 1 (30.05.2024): 16–21. http://dx.doi.org/10.35940/ijrte.f8019.13010524.
Pełny tekst źródłaSaha, Ankita, Chanda Pathak i Sourav Saha. "A Study of Machine Learning Techniques in Cryptography for Cybersecurity". American Journal of Electronics & Communication 1, nr 4 (7.06.2021): 22–26. http://dx.doi.org/10.15864/ajec.1404.
Pełny tekst źródłaVivek Tammineedi, Venkata Satya, i V. N. Rajavarman. "A Novel Analysis of Advanced Visual Cryptography Techniques for Providing Security Against Web Attacks Using Support Vector Machine Technique". Journal of Computational and Theoretical Nanoscience 17, nr 5 (1.05.2020): 2097–114. http://dx.doi.org/10.1166/jctn.2020.8855.
Pełny tekst źródłaPeng, Sheng, Linkai Zhu, Shanwen Hu, Zhiming Cai i Wenjian Liu. "Enhancing Global Blockchain Privacy via a Digital Mutual Trust Mechanism". Mathematics 12, nr 10 (10.05.2024): 1481. http://dx.doi.org/10.3390/math12101481.
Pełny tekst źródłaGobinathan, B., M. A. Mukunthan, S. Surendran, K. Somasundaram, Syed Abdul Moeed, P. Niranjan, V. Gouthami i in. "A Novel Method to Solve Real Time Security Issues in Software Industry Using Advanced Cryptographic Techniques". Scientific Programming 2021 (28.12.2021): 1–9. http://dx.doi.org/10.1155/2021/3611182.
Pełny tekst źródłaShakya, Subarna, i Sanjita Lamichhane. "Secured Crypto Stegano Data Hiding Using Least Significant Bit Substitution and Encryption". Journal of Advanced College of Engineering and Management 2 (29.11.2016): 105. http://dx.doi.org/10.3126/jacem.v2i0.16103.
Pełny tekst źródłaKumar, Boddupalli Anvesh, i V. Bapuji. "Efficient privacy preserving communication protocol for IOT applications". Brazilian Journal of Development 10, nr 1 (5.01.2024): 402–19. http://dx.doi.org/10.34117/bjdv10n1-025.
Pełny tekst źródłaSinaga, Nurainun Hasanah, i Muhammad Syahrizal. "Implementasi Algoritma Mars Pada Pengamanan SMS". JURIKOM (Jurnal Riset Komputer) 7, nr 3 (14.06.2020): 398. http://dx.doi.org/10.30865/jurikom.v7i3.2175.
Pełny tekst źródłaC.Kanmani Pappa. "Zero-Trust Cryptographic Protocols and Differential Privacy Techniques for Scalable Secure Multi-Party Computation in Big Data Analytics". Journal of Electrical Systems 20, nr 5s (13.04.2024): 2114–23. http://dx.doi.org/10.52783/jes.2550.
Pełny tekst źródłavan Gastel, Bernard E., Bart Jacobs i Jean Popma. "Data Protection Using Polymorphic Pseudonymisation in a Large-Scale Parkinson’s Disease Study". Journal of Parkinson's Disease 11, s1 (16.07.2021): S19—S25. http://dx.doi.org/10.3233/jpd-202431.
Pełny tekst źródłaDhiman, Oshin, i Anand Sharma. "Enhancement for Secured File Storage Using Modern Hybrid Cryptography". International Journal on Future Revolution in Computer Science & Communication Engineering 8, nr 1 (31.03.2022): 01–07. http://dx.doi.org/10.17762/ijfrcsce.v8i1.2083.
Pełny tekst źródłaMoldamurat, Khuralay, Yerzhan Seitkulov, Sabyrzhan Atanov, Makhabbat Bakyt i Banu Yergaliyeva. "Enhancing cryptographic protection, authentication, and authorization in cellular networks: a comprehensive research study". International Journal of Electrical and Computer Engineering (IJECE) 14, nr 1 (1.02.2024): 479. http://dx.doi.org/10.11591/ijece.v14i1.pp479-487.
Pełny tekst źródłaOlaniyan, Olatayo Moses, Ayobami Taiwo Olusesi, Bolaji Abigail Omodunbi, Wajeed Bolanle Wahab, Olusogo Julius Adetunji i Bamidele Musiliu Olukoya. "A Data Security Model for Mobile Ad Hoc Network Using Linear Function Mayfly Advanced Encryption Standard". International Journal of Emerging Technology and Advanced Engineering 13, nr 3 (1.03.2023): 101–10. http://dx.doi.org/10.46338/ijetae0323_10.
Pełny tekst źródłaAlthobaiti, Hamad, i Ahmed Adas. "Simulation of Elliptical Curve Cryptography in IPSec on Ad-Hoc Networks". European Journal of Engineering and Formal Sciences 6, nr 1 (4.04.2023): 1–26. http://dx.doi.org/10.26417/687zrj13.
Pełny tekst źródła