Gotowa bibliografia na temat „Encryption techniques”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Spis treści
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Encryption techniques”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Encryption techniques"
Et. al., Jaichandran R,. "A Hybrid Encryption Model with Attribute Based Encryption and Advanced Encryption Standard Techniques". Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, nr 2 (11.04.2021): 334–36. http://dx.doi.org/10.17762/turcomat.v12i2.720.
Pełny tekst źródłaRamanathan, Thirumalaimuthu, Md Jakir Hossen, Md Shohel Sayeed i Joseph Emerson Raja. "Survey on computational intelligence based image encryption techniques". Indonesian Journal of Electrical Engineering and Computer Science 19, nr 3 (1.09.2020): 1428. http://dx.doi.org/10.11591/ijeecs.v19.i3.pp1428-1435.
Pełny tekst źródłaParenreng, Jumadi Mabe, Sahraeni Maulida Mustari i Abdul Wahid. "E-mail Security System Using El-Gamal Hybrid Algorithm and AES (Advanced Encryption Standard) Algorithm". Internet of Things and Artificial Intelligence Journal 2, nr 1 (16.02.2022): 1–9. http://dx.doi.org/10.31763/iota.v2i1.510.
Pełny tekst źródłaSharma, Ramandeep, Richa Sharma i Harmanjit Singh. "Classical Encryption Techniques". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 3, nr 1 (1.08.2012): 84–90. http://dx.doi.org/10.24297/ijct.v3i1b.2745.
Pełny tekst źródłaYeow, Sin-Qian, i Kok-Why Ng. "Neural Network Based Data Encryption: A Comparison Study among DES, AES, and HE Techniques". JOIV : International Journal on Informatics Visualization 7, nr 3-2 (30.11.2023): 2086. http://dx.doi.org/10.30630/joiv.7.3-2.2336.
Pełny tekst źródłaLi, Bingcheng, Dingkang Li i Mingyuan Zhu. "Application analysis of data encryption technology". Applied and Computational Engineering 50, nr 1 (25.03.2024): 199–205. http://dx.doi.org/10.54254/2755-2721/50/20241502.
Pełny tekst źródłaThabit, Zainab Hasan, Sadiq A. Mehdi i Bashar M. Nema. "Enhancing Color Image Security: Encryption with Dynamic Chaotic Three-Dimensional System and Robust Security Analysis". Al-Mustansiriyah Journal of Science 34, nr 4 (30.12.2023): 87–95. http://dx.doi.org/10.23851/mjs.v34i4.1411.
Pełny tekst źródłaYang, Ming, Monica Trifas, Guillermo Francia III i Lei Chen. "Cryptographic and Steganographic Approaches to Ensure Multimedia Information Security and Privacy". International Journal of Information Security and Privacy 3, nr 3 (lipiec 2009): 37–54. http://dx.doi.org/10.4018/jisp.2009100703.
Pełny tekst źródłaAlslman, Yasmeen, Eman Alnagi, Ashraf Ahmad, Yousef AbuHour, Remah Younisse i Qasem Abu Al-haija. "Hybrid Encryption Scheme for Medical Imaging Using AutoEncoder and Advanced Encryption Standard". Electronics 11, nr 23 (30.11.2022): 3967. http://dx.doi.org/10.3390/electronics11233967.
Pełny tekst źródłaMohammed, Zahraa A., Hadeel Qasem Gheni, Zahraa Jabbar Hussein i Ali Kadhum M. Al-Qurabat. "Advancing Cloud Image Security via AES Algorithm Enhancement Techniques". Engineering, Technology & Applied Science Research 14, nr 1 (8.02.2024): 12694–701. http://dx.doi.org/10.48084/etasr.6601.
Pełny tekst źródłaRozprawy doktorskie na temat "Encryption techniques"
Wang, Yongsheng. "Advanced video encryption techniques". Thesis, Queen's University Belfast, 2013. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.602966.
Pełny tekst źródłaDutta, Saurabh. "Approach towards development of efficient encryption techniques". Thesis, University of North Bengal, 2004. http://hdl.handle.net/123456789/26.
Pełny tekst źródłaKasarabada, Yasaswy V. "Efficient Logic Encryption Techniques for Sequential Circuits". University of Cincinnati / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1613752483402656.
Pełny tekst źródłaTalhah, Saad. "Advanced Encryption Techniques using New Mersenne Number Transforms". Thesis, University of Leeds, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.515408.
Pełny tekst źródłaChen, Hang. "Optical Encryption Techniques for Color Image and Hyperspectral Data". Thesis, Université de Lorraine, 2017. http://www.theses.fr/2017LORR0374.
Pełny tekst źródłaOptical information security is one of the most important research directions in information science and technology, especially in the field of copyright protection, confidential information transmission/storage and military remote sensing. Since double random phase encoding technology (DRPE) was proposed, optical image encryption technology has become the main topic of optical information security and it has been developed and studied deeply. Optical encryption techniques offer the possibility of high-speed parallel processing of two dimension image data and hiding information in many different dimensions. In this context, much significant research and investigation on optical image encryption have been presented based on DRPE or further optical operation, such as digital holography, Fresnel transform, gyrator transform. Simultaneously, the encrypted image has been extended from single gray image to double image, color image and multi-image. However, the hyperspectral image, as a significant element in military and commercial remote sensing, has not been deeply researched in optical encryption area until now. This work extends the optical encryption technology from color image to hyperspectral image. For better comprehension of hyperspectral image encryption, this work begins with the introduction and analysis of the characteristics of hyperspectral cube. Subsequently, several kinds of encryption schemes for color image, including symmetric and asymmetric cryptosystem, are presented individually. Furthermore, the optical encryption algorithms for hyperspectral cube are designed for securing both the spatial and spectral information simultaneously. Some numerical simulations are given to validate the performance of the proposed encryption schemes. The corresponding attack experiment results demonstrate the capability and robustness of the approaches designed in this work. The research in this dissertation provides reference for the further practicality of hyperspectral image encryption
Jha, Pawan Kumar. "AN APPROACH TOWARDS DESIGN AND IMPLEMENTATION OF SYMMETRIC ENCRYPTION TECHNIQUES". Thesis, University of North Bengal, 2006. http://hdl.handle.net/123456789/11.
Pełny tekst źródłaWong, Hon Wah. "Image watermarking and data hiding techniques /". View Abstract or Full-Text, 2003. http://library.ust.hk/cgi/db/thesis.pl?ELEC%202003%20WONGH.
Pełny tekst źródłaIncludes bibliographical references (leaves 163-178). Also available in electronic version. Access restricted to campus users.
Brisbane, Gareth Charles Beattie. "On information hiding techniques for digital images". Access electronically, 2004. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20050221.122028/index.html.
Pełny tekst źródłaGuruswamy, Aarumugam Bhupathi Rajan. "Independent Domain of Symmetric Encryption using Least SignificantBit : Computer Vision, Steganography and Cryptography Techniques". Thesis, Högskolan Dalarna, Datateknik, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:du-10063.
Pełny tekst źródłaZhao, Weiliang, University of Western Sydney, of Science Technology and Environment College i School of Computing and Information Technology. "Security techniques for electronic commerce applications". THESIS_CSTE_CIT_Zhao_W.xml, 2003. http://handle.uws.edu.au:8081/1959.7/127.
Pełny tekst źródłaMaster of Science (Hons)
Książki na temat "Encryption techniques"
Held, Gilbert. Top secret data encryption techniques. Carmel, Ind: Sams Pub., 1993.
Znajdź pełny tekst źródłaLian, Shiguo. Multimedia content encryption: Techniques and applications. Boca Raton: Auerbach Publications, 2008.
Znajdź pełny tekst źródłaBorivoje, Furht, i Kirovski Darko, red. Multimedia encryption and authentication techniques and applications. Boca Raton, Fla: Auerbach Publications, 2006.
Znajdź pełny tekst źródłaHeld, Gilbert. Learn encryption techniques with BASIC and C++. Plano, Tex: Wordware Pub., 1999.
Znajdź pełny tekst źródłaGriffiths, James. Investigate, code and compare techniques used in implementing encryption technology. Oxford: Oxford Brookes University, 2003.
Znajdź pełny tekst źródłaSwenson, Christopher. Modern cryptanalysis: Techniques for advanced code breaking. Indianapolis, IN: Wiley Pub., 2008.
Znajdź pełny tekst źródłaS, Schmalz Mark, Society of Photo-optical Instrumentation Engineers. i Society for Industrial and Applied Mathematics., red. Mathematics and applications of data/image coding, compression, and encryption III: 2 August 2000, San Diego, USA. Bellingham, Wash., USA: SPIE, 2000.
Znajdź pełny tekst źródłaS, Schmalz Mark, i Society of Photo-optical Instrumentation Engineers., red. Mathematics of data/image coding, compression, and encryption VII, with applications: 4-5 August, 2004, Denver, Colorado, USA. Bellingham, Wash: SPIE, 2004.
Znajdź pełny tekst źródłaShih, Frank Y. Digital watermarking and steganography: Fundamentals and techniques. Boca Raton, Fl: Taylor & Francis, 2008.
Znajdź pełny tekst źródłaWold, Geoffrey H. Computer crime: Techniques, prevention. Rolling Meadows, Ill: Bankers Pub. Co., 1989.
Znajdź pełny tekst źródłaCzęści książek na temat "Encryption techniques"
Albrecht, Martin, i Carlos Cid. "Algebraic Techniques in Differential Cryptanalysis". W Fast Software Encryption, 193–208. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03317-9_12.
Pełny tekst źródłaGautam, Tanvi. "Identity—Based Encryption". W Emerging Security Algorithms and Techniques, redaktorzy Aditya Thakkar i Nitish Pathak, 159–81. Boca Raton : Taylor & Francis, a CRC title, part of the Taylor &: Chapman and Hall/CRC, 2019. http://dx.doi.org/10.1201/9781351021708-10.
Pełny tekst źródłaGautam, Tanvi, Aditya Thakkar i Nitish Pathak. "Attribute-Based Encryption". W Emerging Security Algorithms and Techniques, 183–95. Boca Raton : Taylor & Francis, a CRC title, part of the Taylor &: Chapman and Hall/CRC, 2019. http://dx.doi.org/10.1201/9781351021708-11.
Pełny tekst źródłaGouget, Aline, Hervé Sibert, Côme Berbain, Nicolas Courtois, Blandine Debraize i Chris Mitchell. "Analysis of the Bit-Search Generator and Sequence Compression Techniques". W Fast Software Encryption, 196–214. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11502760_13.
Pełny tekst źródłaThanki, Rohit M. "Audio Watermarking with Encryption". W Advanced Techniques for Audio Watermarking, 59–81. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-24186-5_5.
Pełny tekst źródłaDinur, Itai, Orr Dunkelman, Nathan Keller i Adi Shamir. "Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64". W Fast Software Encryption, 390–410. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-46706-0_20.
Pełny tekst źródłaLu, Rongxing. "Homomorphic Public Key Encryption Techniques". W Wireless Networks, 13–40. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-32899-7_2.
Pełny tekst źródłaRajendiran, M., B. Syed Ibrahim, R. Pratheesh i C. Nelson Kennnedy Babu. "Multilanguage Based SMS Encryption Techniques". W Advances in Intelligent Systems and Computing, 455–60. New Delhi: Springer India, 2013. http://dx.doi.org/10.1007/978-81-322-0740-5_55.
Pełny tekst źródłaMishra, Prasanna Raghaw, Indivar Gupta i Navneet Gaba. "Cryptanalysis of Multilanguage Encryption Techniques". W Mathematics and Computing 2013, 13–21. New Delhi: Springer India, 2014. http://dx.doi.org/10.1007/978-81-322-1952-1_2.
Pełny tekst źródłaChen, Huaifeng, i Xiaoyun Wang. "Improved Linear Hull Attack on Round-Reduced Simon with Dynamic Key-Guessing Techniques". W Fast Software Encryption, 428–49. Berlin, Heidelberg: Springer Berlin Heidelberg, 2016. http://dx.doi.org/10.1007/978-3-662-52993-5_22.
Pełny tekst źródłaStreszczenia konferencji na temat "Encryption techniques"
Liu Nan, Wang Huifen i Fan Jing. "Time hopping encryption techniques". W IET 2nd International Conference on Wireless, Mobile and Multimedia Networks (ICWMMN 2008). IEE, 2008. http://dx.doi.org/10.1049/cp:20081040.
Pełny tekst źródłaMalladar, Rohit, i Sanjeev Kunte. "Selective video encryption using Sattolo's encryption technique". W 2016 International Conference on Electrical, Electronics, Communication, Computer and Optimization Techniques (ICEECCOT). IEEE, 2016. http://dx.doi.org/10.1109/iceeccot.2016.7955228.
Pełny tekst źródłaShafiq, Sobia, Sundas Hanif, Fasih Ur Rehman, Kamran Tariq i Adeel Nawaz. "Video Encryption Techniques: A Review". W 2019 International Conference on Digitization (ICD). IEEE, 2019. http://dx.doi.org/10.1109/icd47981.2019.9105707.
Pełny tekst źródłaKoganti, Venkata SreeKrishna, Lavanya K. Galla, Nagarjuna Nuthalapati i Anil Varma Kakarlapudi. "Authentication protocols using encryption techniques". W 2016 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT). IEEE, 2016. http://dx.doi.org/10.1109/iccicct.2016.7987921.
Pełny tekst źródłaShunmugan, S., i P. Arockia Jansi Rani. "Encryption-then-compression techniques: A survey". W 2016 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT). IEEE, 2016. http://dx.doi.org/10.1109/iccicct.2016.7988037.
Pełny tekst źródłaDivanshu, Hitu Singla, Vikash Sharma, Bharti Sharma i Prateek Thakral. "A Quick Tour to Encryption Techniques". W 2018 2nd International Conference on Trends in Electronics and Informatics (ICOEI). IEEE, 2018. http://dx.doi.org/10.1109/icoei.2018.8553758.
Pełny tekst źródłaSingh, Kehar. "Optical encryption techniques for data security". W 19th Congress of the International Commission for Optics: Optics for the Quality of Life, redaktorzy Giancarlo C. Righini i Anna Consortini. SPIE, 2003. http://dx.doi.org/10.1117/12.524636.
Pełny tekst źródłaOgiela, Marek R., i Marcin Oczko. "Comparison of Selected Homomorphic Encryption Techniques". W 2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA). IEEE, 2018. http://dx.doi.org/10.1109/aina.2018.00159.
Pełny tekst źródłaWeir, M. "6.1 Encryption Techniques for Test Data". W ettc2022 - European Test and Telemetry Conference. AMA Service GmbH, Von-Münchhausen-Str. 49, 31515 Wunstorf, Germany, 2022. http://dx.doi.org/10.5162/ettc2022/6.1.
Pełny tekst źródłaShyamala, N., i K. Anusudha. "Reversible Chaotic Encryption Techniques For Images". W 2017 Fourth International Conference on Signal Processing,Communication and Networking (ICSCN). IEEE, 2017. http://dx.doi.org/10.1109/icscn.2017.8085656.
Pełny tekst źródłaRaporty organizacyjne na temat "Encryption techniques"
Rannenberg, Kai, Sebastian Pape, Frédéric Tronnier i Sascha Löbner. Study on the Technical Evaluation of De-Identification Procedures for Personal Data in the Automotive Sector. Universitätsbibliothek Johann Christian Senckenberg, październik 2021. http://dx.doi.org/10.21248/gups.63413.
Pełny tekst źródła