Artykuły w czasopismach na temat „Encryption techniques”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Encryption techniques”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Et. al., Jaichandran R,. "A Hybrid Encryption Model with Attribute Based Encryption and Advanced Encryption Standard Techniques". Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, nr 2 (11.04.2021): 334–36. http://dx.doi.org/10.17762/turcomat.v12i2.720.
Pełny tekst źródłaRamanathan, Thirumalaimuthu, Md Jakir Hossen, Md Shohel Sayeed i Joseph Emerson Raja. "Survey on computational intelligence based image encryption techniques". Indonesian Journal of Electrical Engineering and Computer Science 19, nr 3 (1.09.2020): 1428. http://dx.doi.org/10.11591/ijeecs.v19.i3.pp1428-1435.
Pełny tekst źródłaParenreng, Jumadi Mabe, Sahraeni Maulida Mustari i Abdul Wahid. "E-mail Security System Using El-Gamal Hybrid Algorithm and AES (Advanced Encryption Standard) Algorithm". Internet of Things and Artificial Intelligence Journal 2, nr 1 (16.02.2022): 1–9. http://dx.doi.org/10.31763/iota.v2i1.510.
Pełny tekst źródłaSharma, Ramandeep, Richa Sharma i Harmanjit Singh. "Classical Encryption Techniques". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 3, nr 1 (1.08.2012): 84–90. http://dx.doi.org/10.24297/ijct.v3i1b.2745.
Pełny tekst źródłaYeow, Sin-Qian, i Kok-Why Ng. "Neural Network Based Data Encryption: A Comparison Study among DES, AES, and HE Techniques". JOIV : International Journal on Informatics Visualization 7, nr 3-2 (30.11.2023): 2086. http://dx.doi.org/10.30630/joiv.7.3-2.2336.
Pełny tekst źródłaLi, Bingcheng, Dingkang Li i Mingyuan Zhu. "Application analysis of data encryption technology". Applied and Computational Engineering 50, nr 1 (25.03.2024): 199–205. http://dx.doi.org/10.54254/2755-2721/50/20241502.
Pełny tekst źródłaThabit, Zainab Hasan, Sadiq A. Mehdi i Bashar M. Nema. "Enhancing Color Image Security: Encryption with Dynamic Chaotic Three-Dimensional System and Robust Security Analysis". Al-Mustansiriyah Journal of Science 34, nr 4 (30.12.2023): 87–95. http://dx.doi.org/10.23851/mjs.v34i4.1411.
Pełny tekst źródłaYang, Ming, Monica Trifas, Guillermo Francia III i Lei Chen. "Cryptographic and Steganographic Approaches to Ensure Multimedia Information Security and Privacy". International Journal of Information Security and Privacy 3, nr 3 (lipiec 2009): 37–54. http://dx.doi.org/10.4018/jisp.2009100703.
Pełny tekst źródłaAlslman, Yasmeen, Eman Alnagi, Ashraf Ahmad, Yousef AbuHour, Remah Younisse i Qasem Abu Al-haija. "Hybrid Encryption Scheme for Medical Imaging Using AutoEncoder and Advanced Encryption Standard". Electronics 11, nr 23 (30.11.2022): 3967. http://dx.doi.org/10.3390/electronics11233967.
Pełny tekst źródłaMohammed, Zahraa A., Hadeel Qasem Gheni, Zahraa Jabbar Hussein i Ali Kadhum M. Al-Qurabat. "Advancing Cloud Image Security via AES Algorithm Enhancement Techniques". Engineering, Technology & Applied Science Research 14, nr 1 (8.02.2024): 12694–701. http://dx.doi.org/10.48084/etasr.6601.
Pełny tekst źródłaZhu, Bingxin, Puwen Wei i Mingqiang Wang. "Adaptive Security of Broadcast Encryption, Revisited". Security and Communication Networks 2017 (2017): 1–16. http://dx.doi.org/10.1155/2017/1404279.
Pełny tekst źródłaWedad Abdul Khuder Naser, Amal Abbas Kadhim i Safana Hyder Abbas. "Subject review: Image encryption techniques". Global Journal of Engineering and Technology Advances 15, nr 3 (30.06.2023): 029–31. http://dx.doi.org/10.30574/gjeta.2023.15.3.0098.
Pełny tekst źródłaEl-Yahyaoui, Ahmed, i Mohamed Daifr Ech-Cherif El Kettani. "About Fully Homomorphic Encryption Improvement Techniques". International Journal of Embedded and Real-Time Communication Systems 10, nr 3 (lipiec 2019): 1–20. http://dx.doi.org/10.4018/ijertcs.2019070101.
Pełny tekst źródłaPushpendra, Tiwari. "A study and comparison of the various cryptography technique standards within fifteen factors". i-manager's Journal on Digital Forensics & Cyber Security 1, nr 1 (2023): 21. http://dx.doi.org/10.26634/jdf.1.1.19134.
Pełny tekst źródłaJoshi, Bineet, Bansidhar Joshi, Anupama Mishra, Varsha Arya, Avadhesh Kumar Gupta i Dragan Peraković. "A Comparative Study of Privacy-Preserving Homomorphic Encryption Techniques in Cloud Computing". International Journal of Cloud Applications and Computing 12, nr 1 (1.01.2022): 1–11. http://dx.doi.org/10.4018/ijcac.309936.
Pełny tekst źródłaKumar, Brijesh, i Amrita Saraswat. "Security on Cloud using High Level Encryption Techniques". International Journal of Trend in Scientific Research and Development Volume-1, Issue-6 (31.10.2017): 915–18. http://dx.doi.org/10.31142/ijtsrd4712.
Pełny tekst źródłaKaur, Mandeep, Surender Singh i Manjit Kaur. "Computational Image Encryption Techniques: A Comprehensive Review". Mathematical Problems in Engineering 2021 (19.07.2021): 1–17. http://dx.doi.org/10.1155/2021/5012496.
Pełny tekst źródłaMahna, Shivanku, i Sravan Ch. "Data Encryption Techniques for USB". International Journal of Computer Applications 104, nr 7 (18.10.2014): 14–17. http://dx.doi.org/10.5120/18213-9162.
Pełny tekst źródłaSIROMONEY, RANI, K. G. SUBRAMANIAN i P. J. ABISHA. "ENCRYPTION-DECRYPTION TECHNIQUES FOR PICTURES". International Journal of Pattern Recognition and Artificial Intelligence 03, nr 03n04 (grudzień 1989): 497–503. http://dx.doi.org/10.1142/s0218001489000371.
Pełny tekst źródłaVasim Ahamad, Mohd, Misbah Urrahman Siddiqui, Maria Masroor i Urooj Fatima. "An Improved Playfair Encryption Technique Using Fibonacci Series Generated Secret Key". International Journal of Engineering & Technology 7, nr 4.5 (22.09.2018): 347. http://dx.doi.org/10.14419/ijet.v7i4.5.20104.
Pełny tekst źródłaRanjan, Kumar H. S., Safeeriya S. P. Fathimath, Ganesh Aithal i Surendra Shetty. "A Survey on Key(s) and Keyless Image Encryption Techniques". Cybernetics and Information Technologies 17, nr 4 (27.11.2017): 134–64. http://dx.doi.org/10.1515/cait-2017-0046.
Pełny tekst źródłaDr.R.Premkumar., Dr.C.Priya., S.Vengatesh Kumar.,, Dr M. Vidhyalakshmi &. Dr S. Saranya;. "Investigation on Image Encryption Using Chaos Based Techniques". International Journal for Modern Trends in Science and Technology 7, nr 05 (27.05.2021): 147–53. http://dx.doi.org/10.46501/ijmtst0705025.
Pełny tekst źródłaParthasarathy, Rajamohan, Seow Soon Loong i Preethy Ayyappan. "An Efficient Encryption Implementation Using AES Algorithm Techniques". Journal of Engineering & Technological Advances 3, nr 1 (2018): 61–70. http://dx.doi.org/10.35934/segi.v3i1.61.
Pełny tekst źródłaJameel, Enas Ali, i Sameera Abbas Fadhel. "Digital Image Encryption Techniques: Article Review". Technium: Romanian Journal of Applied Sciences and Technology 4, nr 2 (27.02.2022): 24–35. http://dx.doi.org/10.47577/technium.v4i2.6026.
Pełny tekst źródłaSimkin, Mark G. "Using Spreadsheets to Teach Data Encryption Techniques". AIS Educator Journal 1, nr 1 (1.12.2006): 27–37. http://dx.doi.org/10.3194/aise.2006.1.1.27.
Pełny tekst źródłaM, Sreekala, i Varghese Paul. "A Novel Hybrid Encryption Method for Multimedia Encryption Using Elliptic Curve Cryptography and TDMRC". International Journal of Emerging Research in Management and Technology 6, nr 7 (29.06.2018): 1. http://dx.doi.org/10.23956/ijermt.v6i7.178.
Pełny tekst źródłaAl-Fayoumi, Mustafa A., Ammar Odeh, Ismail Keshta i Ashraf Ahmad. "Techniques of medical image encryption taxonomy". Bulletin of Electrical Engineering and Informatics 11, nr 4 (1.08.2022): 1990–97. http://dx.doi.org/10.11591/eei.v11i4.3850.
Pełny tekst źródłaPrashant, MD Sohail Haque, Amrinder Kaur i Pankaj Yadav. "Comparative Analysis of AES and RSA with Other Encryption Techniques for Secure Communication". International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, nr 2 (19.04.2024): 565–74. http://dx.doi.org/10.32628/cseit2410263.
Pełny tekst źródłaAbu Zitar, Raed, i Muhammed J. Al-Muhammed. "Hybrid encryption technique: Integrating the neural network with distortion techniques". PLOS ONE 17, nr 9 (28.09.2022): e0274947. http://dx.doi.org/10.1371/journal.pone.0274947.
Pełny tekst źródłaGosavi, Mr Abhijeet, Mr Sakib Shaikh, Mr Adnan Sayyed, Mr Somesh Sapa, Mr Ayan Shaikh i Prof A. A. Pund. "Enabling Encrypted Cloud Emails with Data Encryption using Advanced Encryption Techniques". International Journal for Research in Applied Science and Engineering Technology 11, nr 6 (30.06.2023): 864–69. http://dx.doi.org/10.22214/ijraset.2023.53709.
Pełny tekst źródłaGeetha, S., P. Punithavathi, A. Magnus Infanteena i S. Siva Sivatha Sindhu. "A Literature Review on Image Encryption Techniques". International Journal of Information Security and Privacy 12, nr 3 (lipiec 2018): 42–83. http://dx.doi.org/10.4018/ijisp.2018070104.
Pełny tekst źródłaMark Espalmado, John, i Edwin Arboleda. "DARE Algorithm: A New Security Protocol by Integration of Different Cryptographic Techniques". International Journal of Electrical and Computer Engineering (IJECE) 7, nr 2 (1.04.2017): 1032. http://dx.doi.org/10.11591/ijece.v7i2.pp1032-1041.
Pełny tekst źródłaChowdhary, Chiranji Lal, Pushpam Virenbhai Patel, Krupal Jaysukhbhai Kathrotia, Muhammad Attique, Kumaresan Perumal i Muhammad Fazal Ijaz. "Analytical Study of Hybrid Techniques for Image Encryption and Decryption". Sensors 20, nr 18 (10.09.2020): 5162. http://dx.doi.org/10.3390/s20185162.
Pełny tekst źródłaSridhar, B. "Performance Evaluation of Different Encryption Techniques". Research Journal of Engineering and Technology 9, nr 3 (2018): 227. http://dx.doi.org/10.5958/2321-581x.2018.00031.4.
Pełny tekst źródłaDhiman, Reema. "IMAGE ENCRYPTION TECHNIQUES: A LITERATURE REVIEW". International Journal of Advanced Research in Computer Science 8, nr 7 (20.08.2017): 239–44. http://dx.doi.org/10.26483/ijarcs.v8i7.4209.
Pełny tekst źródłaSoofi, Aized Amin, M. Irfan Khan i Fazal-e. Amin. "Encryption Techniques for Cloud Data Confidentiality". International Journal of Grid and Distributed Computing 7, nr 4 (31.08.2014): 11–20. http://dx.doi.org/10.14257/ijgdc.2014.7.4.02.
Pełny tekst źródłaM. Abdullah, Rozin, i Araz Rajab Abrahim. "Review of Image Encryption using Different Techniques". Academic Journal of Nawroz University 11, nr 3 (30.06.2022): 170–77. http://dx.doi.org/10.25007/ajnu.v11n3a1301.
Pełny tekst źródłaViresh, Kasheenath Babaleshwar, Karade Sinchana, N. Sakshi i Naidu Anush. "Audio encryption and decryption using AES algorithm technique". i-manager’s Journal on Electronics Engineering 14, nr 2 (2024): 8. http://dx.doi.org/10.26634/jele.14.2.20486.
Pełny tekst źródłaAzhari, Rama, i Agita Nisa Salsabila. "Analyzing the Impact of Quantum Computing on Current Encryption Techniques". IAIC Transactions on Sustainable Digital Innovation (ITSDI) 5, nr 2 (22.02.2024): 148–57. http://dx.doi.org/10.34306/itsdi.v5i2.662.
Pełny tekst źródłaGaurav Agarwal, Mohammed Shakeel, Akash Sanghi, YDS Arya,. "A Novel Security Model for Password Encryption Using Aadhaar and Amicable Number". Tuijin Jishu/Journal of Propulsion Technology 44, nr 4 (16.10.2023): 1096–107. http://dx.doi.org/10.52783/tjjpt.v44.i4.981.
Pełny tekst źródłaDr. Gaurav Aggarwal, Mr. Hirdesh Sharma. "Comparative Analysis of Multi-Level Algorithm with Different Encryption and Decryption Security Algorithms". Tuijin Jishu/Journal of Propulsion Technology 44, nr 3 (5.10.2023): 1640–48. http://dx.doi.org/10.52783/tjjpt.v44.i3.555.
Pełny tekst źródłaWadho, Shuaib Ahmed, Areej Fatemah Meghji, Aun Yichiet, Roshan Kumar i Farhan Bashir Shaikh. "Encryption Techniques and Algorithms to Combat Cybersecurity Attacks: A Review". VAWKUM Transactions on Computer Sciences 11, nr 1 (30.06.2023): 295–305. http://dx.doi.org/10.21015/vtcs.v11i1.1521.
Pełny tekst źródłaIrwanto, Dola. "File Encryption and Decryption Using Algorithm Aes-128 Bit Based Website". MALCOM: Indonesian Journal of Machine Learning and Computer Science 4, nr 2 (1.04.2024): 670–77. http://dx.doi.org/10.57152/malcom.v4i2.1305.
Pełny tekst źródłaKannan, Rajesh, i Dr R. Mala. "Analysis of Encryption Techniques to Enhance Secure Data Transmission". International Journal of Engineering and Computer Science 7, nr 09 (9.09.2018): 24311–18. http://dx.doi.org/10.18535/ijecs/v7i9.04.
Pełny tekst źródłaGarg, Monika, Karanvir Kaur i Simerpreet Kaur. "Using 3GPP- A Secure IDS for MANETs". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 4, nr 2 (30.10.2005): 518–21. http://dx.doi.org/10.24297/ijct.v4i2b2.3312.
Pełny tekst źródłaIbrahim, Dina, Kareem Ahmed, Mohamed Abdallah i AbdElmgeid A. Ali. "A New Chaotic-Based RGB Image Encryption Technique Using a Nonlinear Rotational 16 × 16 DNA Playfair Matrix". Cryptography 6, nr 2 (8.06.2022): 28. http://dx.doi.org/10.3390/cryptography6020028.
Pełny tekst źródłaShah, Jalpa, i JS Dhobi. "REVIEW OF IMAGE ENCRYPTION AND DECRYPTION TECHNIQUES FOR 2D IMAGES". International Journal of Engineering Technologies and Management Research 5, nr 1 (7.02.2020): 81–84. http://dx.doi.org/10.29121/ijetmr.v5.i1.2018.49.
Pełny tekst źródłaRabie, A., Kh El Shafie, A. Hammuoda i M. Rohiem. "Data ecryption based on multi-order FrFT, and FPGA implementation of DES algorith". International Journal of Reconfigurable and Embedded Systems (IJRES) 9, nr 2 (1.07.2020): 141. http://dx.doi.org/10.11591/ijres.v9.i2.pp141-152.
Pełny tekst źródłaEt. al., K. S. Mohanasathiya,. "Security And Privacy Using Two Fold Encryption Protocol Techniques In Edge Computing". Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, nr 10 (28.04.2021): 6025–34. http://dx.doi.org/10.17762/turcomat.v12i10.5427.
Pełny tekst źródłaFadhel, Sabah, Mohd Shafry i Omar Farook. "Chaos Image Encryption Methods: A Survey Study". Bulletin of Electrical Engineering and Informatics 6, nr 1 (1.03.2017): 99–104. http://dx.doi.org/10.11591/eei.v6i1.599.
Pełny tekst źródła