Gotowa bibliografia na temat „Decryption”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Spis treści
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Decryption”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Decryption"
Partala, Juha. "Symmetric Blind Decryption with Perfect Secrecy". Journal of Computer Networks and Communications 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/6575907.
Pełny tekst źródłaZheng, Ting, i Zhi Zhong Zhang. "A Method Based on Hash Table to Implement the NAS Layer Decryption in LTE Big Data Platform". Applied Mechanics and Materials 716-717 (grudzień 2014): 1430–33. http://dx.doi.org/10.4028/www.scientific.net/amm.716-717.1430.
Pełny tekst źródłaPopescu, Narcis I., Cristina Lupu i Florea Lupu. "Calcium Ionophore-Induced Tissue Factor (TF) Decryption Induces TF Immobilization Into Lipid Rafts and Negative Regulation of TF Procoagulant Activity." Blood 116, nr 21 (19.11.2010): 1131. http://dx.doi.org/10.1182/blood.v116.21.1131.1131.
Pełny tekst źródłaWadehra, Shivangi, Shivam Goel i Nidhi Sengar. "AES Algorithm: Encryption and Decryption". International Journal of Trend in Scientific Research and Development Volume-2, Issue-3 (30.04.2018): 1075–77. http://dx.doi.org/10.31142/ijtsrd11221.
Pełny tekst źródłaPatil, Vedika, Sakshi Jain i Yogita Shah. "Secure Cryptography by Using Hash Application". Journal of Cyber Security in Computer System 1, nr 1 (11.05.2022): 18–24. http://dx.doi.org/10.46610/jcscs.2022.v01i01.002.
Pełny tekst źródłaLiu, Bao Long, Hua Chen i Yi Guo. "Encrypted XML Data Query Processing with Range Query". Applied Mechanics and Materials 65 (czerwiec 2011): 241–45. http://dx.doi.org/10.4028/www.scientific.net/amm.65.241.
Pełny tekst źródłaLee, Sang-Un, i Myeong-Bok Choi. "Integer Factorization for Decryption". Journal of the Institute of Webcasting, Internet and Telecommunication 13, nr 6 (31.12.2013): 221–28. http://dx.doi.org/10.7236/jiibc.2013.13.6.221.
Pełny tekst źródłaCeruzzi, P. "Decryption Day by Day". Science 264, nr 5161 (13.05.1994): 990–92. http://dx.doi.org/10.1126/science.264.5161.990.
Pełny tekst źródłaButenas, Saulius, i Jolanta Krudysz-Amblo. "Decryption of tissue factor". Thrombosis Research 129 (maj 2012): S18—S20. http://dx.doi.org/10.1016/j.thromres.2012.02.022.
Pełny tekst źródłaBalasubramanian, Dr Kannan, M. Arun i Dr K. R. Sekar. "An Improved RSA Algorithm for Enhanced Security". Indian Journal of Cryptography and Network Security 2, nr 2 (30.11.2022): 1–4. http://dx.doi.org/10.54105/ijcns.b1421.112222.
Pełny tekst źródłaRozprawy doktorskie na temat "Decryption"
Strand, Martin. "Verifiable Shuffled Decryption". Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for matematiske fag, 2013. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-21427.
Pełny tekst źródłaBurman, Annie. "Gendering decryption - decrypting gender : The gender discourse of labour at Bletchley Park 1939-1945". Thesis, Uppsala universitet, Historiska institutionen, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-201046.
Pełny tekst źródłaTakagi, Tsuyoshi. "New public-key cryptosystems with fast decryption". Phd thesis, [S.l. : s.n.], 2001. http://deposit.ddb.de/cgi-bin/dokserv?idn=962729302.
Pełny tekst źródłaKäck, Emil. "TLS Decryption in passive monitoring system with server private key". Thesis, Umeå universitet, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-184490.
Pełny tekst źródłaMerz, Doug, i Bruce Maples. "Encrypt/Decrypt COMSEC Unit for Space-based Command and Telemetry Applications". International Foundation for Telemetering, 2003. http://hdl.handle.net/10150/605565.
Pełny tekst źródłaThis paper describes the system-level architecture and design concept of a communications security (COMSEC) equipment intended for space-based low data rate (< 1 Mbps) command and telemetry applications. The COMSEC Unit is a stand-alone piece of equipment which provides decryption of uplink command and control information and encryption of downlink telemetry data. The system-level architecture is described followed by an overview of the digital design concepts and a discussion of applications. Finally, although specifically targeted for narrowband command and telemetry applications, this design approach is flexible enough to accommodate other algorithms of choice as well as operate in higher data rate applications.
Loban, H. "A VHDL Implemetation of the Advanced Encryption Standard". Thesis, NURE, MC&FPGA, 2019. https://mcfpga.nure.ua/conf/2019-mcfpga/10-35598-mcfpga-2019-014.
Pełny tekst źródłaGreinsmark, Carl. "Ransomware". Thesis, Högskolan Kristianstad, Fakulteten för naturvetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hkr:diva-20695.
Pełny tekst źródłaSamuel, David. "RFID security in door locks". Thesis, Linköping University, Department of Computer and Information Science, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-12186.
Pełny tekst źródłaRadio frequency identification, RFID is a technology that is used in many fields including locks. The unlimited access to the reader and the transponder has resulted in severe security weaknesses and made it possible to apply different attacks. To classify door locks as secure they must at least fulfil two main criteria: the first is the use of a challenge-response authentication protocol and the second is to deploy sophisticated and secure algorithms.
MiFare classic and KeeLoq are two widely applied technologies that are still in use in many security critical applications and are considered to be secure but which have been broken by cryptanalysis and with modest efforts and cost.
How secure a certain solution is depends on how expensive it is to buy the equipment that can break the system and reveal the secret key and how secure a lock should be depends on the value of what it is protecting.
The dropping price of powerful computers and the availability of security related information on the web will lead to an increase of the number of attacks on different systems.
By the time this thesis is published those locks evaluated are not secure enough, to overcome the security shortage some improvements have to be made such as: the use of sophisticated algorithms, the use of longer key of at least 128-bit, the use of non-deterministic random number generators and the use of pure hardware solutions both in the receiver and the transmitter to reduce leakage.
Manteena, Rajender. "A VHDL Implemetation of the Advanced Encryption Standard-Rijndael Algorithm". Scholar Commons, 2004. https://scholarcommons.usf.edu/etd/1149.
Pełny tekst źródłaKundur, Abhinay. "Digital and Analog Signal Encryption and Decryption in Mid RF Range Using Hybrid Acousto-Optic Chaos". University of Dayton / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=dayton1336100009.
Pełny tekst źródłaKsiążki na temat "Decryption"
Martínez-Guerra, Rafael, Juan Javier Montesinos-García i Juan Pablo Flores-Flores. Encryption and Decryption Algorithms for Plain Text and Images using Fractional Calculus. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-20698-6.
Pełny tekst źródłaCommunication, life, mega-evolution: Decrypting life's nature. Leuven: Leuven University Press, 2002.
Znajdź pełny tekst źródłaBeardsley, Ian. Et Decryption. Lulu Press, Inc., 2016.
Znajdź pełny tekst źródłaMarks, Philip. Decryption Engine. Independently Published, 2016.
Znajdź pełny tekst źródłaDecryption of Indus Scripts. Internet, 2012.
Znajdź pełny tekst źródłaMuniraj, Inbarasan, i John T. Sheridan. Optical Encryption and Decryption. SPIE, 2019. http://dx.doi.org/10.1117/3.2523506.
Pełny tekst źródłaNagelhout, Ryan. Digital ERA Encryption and Decryption. Rosen Publishing Group, 2016.
Znajdź pełny tekst źródłaNagelhout, Ryan. Digital Era Encryption and Decryption. Rosen Publishing Group, 2016.
Znajdź pełny tekst źródłaSwearingen, Loren L. Decryption of the Zodiac Z18 Code. Lulu Press, Inc., 2016.
Znajdź pełny tekst źródłaSwearingen, Loren L. Decryption of the Lipstick Killer Wall Code. Loren L Swearingen, 2015.
Znajdź pełny tekst źródłaCzęści książek na temat "Decryption"
Weik, Martin H. "decryption". W Computer Science and Communications Dictionary, 372. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_4547.
Pełny tekst źródłaKaliski, Burt. "Decryption Exponent". W Encyclopedia of Cryptography and Security, 322. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_400.
Pełny tekst źródłaMu, Yi, Vijay Varadharajan i Khan Quac Nguyen. "Delegated Decryption". W Cryptography and Coding, 258–69. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-46665-7_30.
Pełny tekst źródłaRyan, Mark D. "Making Decryption Accountable". W Security Protocols XXV, 93–98. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-71075-4_11.
Pełny tekst źródłaGreen, Matthew. "Secure Blind Decryption". W Public Key Cryptography – PKC 2011, 265–82. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-19379-8_16.
Pełny tekst źródłaHassan, Nihad A. "Ransomware Decryption Tools". W Ransomware Revealed, 191–201. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4255-1_8.
Pełny tekst źródłaKävrestad, Joakim. "Decryption and Password Enforcing". W Fundamentals of Digital Forensics, 39–46. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-96319-8_5.
Pełny tekst źródłaKävrestad, Joakim. "Decryption and Password Enforcing". W Fundamentals of Digital Forensics, 47–55. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-38954-3_5.
Pełny tekst źródłaOhta, Kazuo. "Remarks on blind decryption". W Lecture Notes in Computer Science, 109–15. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/bfb0030413.
Pełny tekst źródłaArmour, Marcel, i Bertram Poettering. "Subverting Decryption in AEAD". W Cryptography and Coding, 22–41. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-35199-1_2.
Pełny tekst źródłaStreszczenia konferencji na temat "Decryption"
Zivic, Natasa, Esad Kadusic i Mirko Skrbic. "Mathematical optimization of decrypting algorithm for soft input decryption". W 2009 XXII International Symposium on Information, Communication and Automation Technologies (ICAT 2009). IEEE, 2009. http://dx.doi.org/10.1109/icat.2009.5348411.
Pełny tekst źródłaMüller, Jens, Fabian Ising, Vladislav Mladenov, Christian Mainka, Sebastian Schinzel i Jörg Schwenk. "Practical Decryption exFiltration". W CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3319535.3354214.
Pełny tekst źródłaKalaichelvi, V., i R. M. Chandrasekaran. "FSPAlgorithm for encryption/decryption". W 2008 International Conference on Computing, Communication and Networking (ICCCN). IEEE, 2008. http://dx.doi.org/10.1109/icccnet.2008.4787779.
Pełny tekst źródłaGahi, Youssef, Farid Bourennani, Mouhcine Guennoun i Hussein T. Mouftah. "Blind decryption for cloud computing". W 2016 IEEE Symposium on Computers and Communication (ISCC). IEEE, 2016. http://dx.doi.org/10.1109/iscc.2016.7543875.
Pełny tekst źródłaCohen, Aloni, Sarah Scheffler i Mayank Varia. "Can the Government Compel Decryption?" W CSLAW '22: Symposium on Computer Science and Law. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3511265.3550441.
Pełny tekst źródłaQuirem, Saddam, i Byeong Kil Lee. "AES decryption using warp-synchronous programming". W 2012 IEEE 31st International Performance Computing and Communications Conference (IPCCC). IEEE, 2012. http://dx.doi.org/10.1109/pccc.2012.6407714.
Pełny tekst źródłaMcHardy, Patrick, Andreas Schuler i Erik Tews. "Interactive decryption of DECT phone calls". W the fourth ACM conference. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/1998412.1998426.
Pełny tekst źródłaTao, Shaohua. "A Practical Holographic Encryption/Decryption Technique". W Biomedical Optics. Washington, D.C.: OSA, 2012. http://dx.doi.org/10.1364/biomed.2012.jm3a.57.
Pełny tekst źródłaBohli, Jens-Matthias, Roman Kurpatov i Mischa Schmidt. "Selective decryption of outsourced IoT data". W 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT). IEEE, 2015. http://dx.doi.org/10.1109/wf-iot.2015.7389146.
Pełny tekst źródłaChatsomsanga, Jutiphat, i Chawalit Benjangkaprasert. "Malware Developing Guide: Encryption and Decryption". W 2021 23rd International Conference on Advanced Communication Technology (ICACT). IEEE, 2021. http://dx.doi.org/10.23919/icact51234.2021.9370932.
Pełny tekst źródłaRaporty organizacyjne na temat "Decryption"
Negron, Melvin S. Study of the Hill Cipher Encryption/Decryption Algorithm. Fort Belvoir, VA: Defense Technical Information Center, kwiecień 2012. http://dx.doi.org/10.21236/ada581720.
Pełny tekst źródłaDolmatov, V., red. GOST 28147-89: Encryption, Decryption, and Message Authentication Code (MAC) Algorithms. RFC Editor, marzec 2010. http://dx.doi.org/10.17487/rfc5830.
Pełny tekst źródłaEverett, Martin. EU–US collaboration on quantum technologies. Royal Institute of International Affairs, styczeń 2021. http://dx.doi.org/10.55317/9781784134211.
Pełny tekst źródłavon Luckner, Clemens Graf, Carmen Reinhart i Kenneth Rogoff. Decrypting New Age International Capital Flows. Cambridge, MA: National Bureau of Economic Research, październik 2021. http://dx.doi.org/10.3386/w29337.
Pełny tekst źródła