Artykuły w czasopismach na temat „Encryption”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Encryption”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Sun, Chenbo. "Comparative Study of RSA Encryption and Quantum Encryption". Theoretical and Natural Science 2, nr 1 (20.02.2023): 121–25. http://dx.doi.org/10.54254/2753-8818/2/20220098.
Pełny tekst źródłaPourasad, Yaghoub, Ramin Ranjbarzadeh i Abbas Mardani. "A New Algorithm for Digital Image Encryption Based on Chaos Theory". Entropy 23, nr 3 (13.03.2021): 341. http://dx.doi.org/10.3390/e23030341.
Pełny tekst źródłaThabit, Zainab Hasan, Sadiq A. Mehdi i Bashar M. Nema. "Enhancing Color Image Security: Encryption with Dynamic Chaotic Three-Dimensional System and Robust Security Analysis". Al-Mustansiriyah Journal of Science 34, nr 4 (30.12.2023): 87–95. http://dx.doi.org/10.23851/mjs.v34i4.1411.
Pełny tekst źródłaEt. al., Jaichandran R,. "A Hybrid Encryption Model with Attribute Based Encryption and Advanced Encryption Standard Techniques". Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, nr 2 (11.04.2021): 334–36. http://dx.doi.org/10.17762/turcomat.v12i2.720.
Pełny tekst źródłaAlawi, Attaa R., i Nidaa F. Hassan. "A Proposal Video Encryption Using Light Stream Algorithm". Engineering and Technology Journal 39, nr 1B (25.03.2021): 184–96. http://dx.doi.org/10.30684/etj.v39i1b.1689.
Pełny tekst źródłaZhu, Bingxin, Puwen Wei i Mingqiang Wang. "Adaptive Security of Broadcast Encryption, Revisited". Security and Communication Networks 2017 (2017): 1–16. http://dx.doi.org/10.1155/2017/1404279.
Pełny tekst źródłaZhang, Jian, i Yutong Zhang. "An Image Encryption Algorithm Based on Balanced Pixel and Chaotic Map". Mathematical Problems in Engineering 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/216048.
Pełny tekst źródłaNori, Ahmed S., i Ansam O. Abdulmajeed. "Design and implementation of Threefish cipher algorithm in PNG file". Sustainable Engineering and Innovation 3, nr 2 (29.05.2021): 79–91. http://dx.doi.org/10.37868/sei.v3i2.id131.
Pełny tekst źródłaAlslman, Yasmeen, Eman Alnagi, Ashraf Ahmad, Yousef AbuHour, Remah Younisse i Qasem Abu Al-haija. "Hybrid Encryption Scheme for Medical Imaging Using AutoEncoder and Advanced Encryption Standard". Electronics 11, nr 23 (30.11.2022): 3967. http://dx.doi.org/10.3390/electronics11233967.
Pełny tekst źródłaAli Pitchay, Sakinah, Wail Abdo Ali Alhiagem, Farida Ridzuan i Sundresan Perumal. "Mobile Application Design for Protecting the Data in Cloud Using Enhanced Technique of Encryption". International Journal of Engineering & Technology 7, nr 4.15 (7.10.2018): 98. http://dx.doi.org/10.14419/ijet.v7i4.15.21427.
Pełny tekst źródłaAlzain, Mohammed. "Chaos Baker-based Image Encryption in Operation Modes". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 17, nr 1 (16.01.2018): 7153–63. http://dx.doi.org/10.24297/ijct.v17i1.7328.
Pełny tekst źródłaKuo, Tzu-Hsiang, i Ja-Ling Wu. "A High Throughput BFV-Encryption-Based Secure Comparison Protocol". Mathematics 11, nr 5 (2.03.2023): 1227. http://dx.doi.org/10.3390/math11051227.
Pełny tekst źródłaParenreng, Jumadi Mabe, Sahraeni Maulida Mustari i Abdul Wahid. "E-mail Security System Using El-Gamal Hybrid Algorithm and AES (Advanced Encryption Standard) Algorithm". Internet of Things and Artificial Intelligence Journal 2, nr 1 (16.02.2022): 1–9. http://dx.doi.org/10.31763/iota.v2i1.510.
Pełny tekst źródłaRamanathan, Thirumalaimuthu, Md Jakir Hossen, Md Shohel Sayeed i Joseph Emerson Raja. "Survey on computational intelligence based image encryption techniques". Indonesian Journal of Electrical Engineering and Computer Science 19, nr 3 (1.09.2020): 1428. http://dx.doi.org/10.11591/ijeecs.v19.i3.pp1428-1435.
Pełny tekst źródłaYeow, Sin-Qian, i Kok-Why Ng. "Neural Network Based Data Encryption: A Comparison Study among DES, AES, and HE Techniques". JOIV : International Journal on Informatics Visualization 7, nr 3-2 (30.11.2023): 2086. http://dx.doi.org/10.30630/joiv.7.3-2.2336.
Pełny tekst źródłaAbeer Salim Jamil, Raghad Abdulaali Azeez i Nidaa Flaih Hassan. "An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments". International Journal of Online and Biomedical Engineering (iJOE) 19, nr 01 (17.01.2023): 93–106. http://dx.doi.org/10.3991/ijoe.v19i01.36901.
Pełny tekst źródłaHuda Anwar i Zill e Shams. "Algorithms of Encryption Using Graph Theory". Mathematical Sciences and Applications 2, nr 2 (31.12.2023): 73–85. http://dx.doi.org/10.52700/msa.v2i2.16.
Pełny tekst źródłaAlsalam Ali, Nashwan, Abdul Monem S. Rahma i Shaimaa H. Shaker. "Survey on 3D Content Encryption". International Journal of Interactive Mobile Technologies (iJIM) 15, nr 15 (11.08.2021): 115. http://dx.doi.org/10.3991/ijim.v15i15.24179.
Pełny tekst źródłaAitkhozhayeva, Y. Zh, i D. S. Akhmetsharipov. "Technology for using special encryption functions in PostgreSQL". Bulletin of the National Engineering Academy of the Republic of Kazakhstan 91, nr 1 (15.03.2024): 21–29. http://dx.doi.org/10.47533/2024.1606-146x.02.
Pełny tekst źródłaWang, Pengfei, Yixu Wang, Jiafu Xiang i Xiaoling Xiao. "Fast Image Encryption Algorithm for Logistics-Sine-Cosine Mapping". Sensors 22, nr 24 (16.12.2022): 9929. http://dx.doi.org/10.3390/s22249929.
Pełny tekst źródłaHuang, Xing Li, i Huan Chun Yang. "Two-Way ID Authentication and Hardware Encryption-Based Security Design of Mobile Hard Disk". Applied Mechanics and Materials 58-60 (czerwiec 2011): 573–78. http://dx.doi.org/10.4028/www.scientific.net/amm.58-60.573.
Pełny tekst źródłaAgarwal, Sohit, i Gagan Joshi. "Hybrid Encryption of Cloud Processing With IOT Devices Using DNA And RSA Cryptography". International Journal on Recent and Innovation Trends in Computing and Communication 11, nr 6 (10.07.2023): 21–27. http://dx.doi.org/10.17762/ijritcc.v11i6.6767.
Pełny tekst źródłaLi, Bingcheng, Dingkang Li i Mingyuan Zhu. "Application analysis of data encryption technology". Applied and Computational Engineering 50, nr 1 (25.03.2024): 199–205. http://dx.doi.org/10.54254/2755-2721/50/20241502.
Pełny tekst źródłaLimbachia, Dipen. "Encryption of Card Details Using AES with a 128-bit Key a Secure Approach to Data Protection". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, nr 03 (25.03.2024): 1–5. http://dx.doi.org/10.55041/ijsrem29484.
Pełny tekst źródłaKovalchuk, A. M., Yuriy Peleckh i Tetiana Bubela. "BIT OPERATIONS WITH ELEMENTS OF THE RSA ALGORITHM IN ENCRYPTION-DECRYPTION OF COLOR IMAGES". Measuring Equipment and Metrology 83, nr 3 (2022): 5–10. http://dx.doi.org/10.23939/istcmtm2022.03.005.
Pełny tekst źródłaSinha, Mr Anurag, i Mr Amrit Kumar Bhadani. "Double Layer Cryptography using Multiplicative Cipher and Chemical Periodic Table". Indian Journal of Data Communication and Networking 1, nr 2 (10.04.2021): 21–30. http://dx.doi.org/10.35940/ijdcn.b5008.041221.
Pełny tekst źródłaSinha, Mr Anurag, i Mr Amrit Kumar Bhadani. "Double Layer Cryptography using Multiplicative Cipher and Chemical Periodic Table". Indian Journal of Data Communication and Networking 1, nr 2 (10.04.2021): 21–30. http://dx.doi.org/10.54105/ijdcn.b5008.041221.
Pełny tekst źródłaPushpendra, Tiwari. "A study and comparison of the various cryptography technique standards within fifteen factors". i-manager's Journal on Digital Forensics & Cyber Security 1, nr 1 (2023): 21. http://dx.doi.org/10.26634/jdf.1.1.19134.
Pełny tekst źródłaIrzayzah, Mr Samyrah M. Abu. "A New Application for Encryption and Decryption Using the TAS Algorithm". International Journal for Research in Applied Science and Engineering Technology 11, nr 11 (30.11.2023): 2428–44. http://dx.doi.org/10.22214/ijraset.2023.56928.
Pełny tekst źródłaSedighi, M., S. K. Mahmoudi i A. S. Amini. "PROPOSING A NEW METHOD FOR ENCRYPTING SATELLITE IMAGES BASED ON HASH FUNCTION AND CHAOS PARAMETERS". ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLII-4/W18 (19.10.2019): 949–53. http://dx.doi.org/10.5194/isprs-archives-xlii-4-w18-949-2019.
Pełny tekst źródłaSu, Bo, Qingyue Yang, Jinlong Yang i Manjun Zhang. "Encryption algorithm for network communication information based on binary logistic regression". Journal of Intelligent & Fuzzy Systems 39, nr 2 (31.08.2020): 1627–37. http://dx.doi.org/10.3233/jifs-179936.
Pełny tekst źródłaYu, Wanbo, i Hao Wang. "Analysis of trigonometric chaotic sequence by proposing an index-based bit level scrambling image encryption". Modern Physics Letters B 35, nr 24 (8.07.2021): 2150406. http://dx.doi.org/10.1142/s0217984921504066.
Pełny tekst źródłaYang, Ming, Monica Trifas, Guillermo Francia III i Lei Chen. "Cryptographic and Steganographic Approaches to Ensure Multimedia Information Security and Privacy". International Journal of Information Security and Privacy 3, nr 3 (lipiec 2009): 37–54. http://dx.doi.org/10.4018/jisp.2009100703.
Pełny tekst źródłaLi, Guang Shi. "Research on Encryption Method of the GML Spatial Data in Geographic Information Sharing System". Advanced Materials Research 756-759 (wrzesień 2013): 1506–10. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.1506.
Pełny tekst źródłaKumari, Abinaya, B. Akshaya, B. Umamaheswari, K. Thenmozhi, Rengarajan Amirtharajan i Padmapriya Praveenkumar. "3D Lorenz Map Governs DNA Rule in Encrypting DICOM Images". Biomedical and Pharmacology Journal 11, nr 2 (26.06.2018): 897–906. http://dx.doi.org/10.13005/bpj/1446.
Pełny tekst źródłaKang, Hong Xia, i Xiao Jun Tong. "The Video Encryption Algorithm for H.264 Based on Hyper Chaotic System". Applied Mechanics and Materials 651-653 (wrzesień 2014): 2000–2003. http://dx.doi.org/10.4028/www.scientific.net/amm.651-653.2000.
Pełny tekst źródłaKouadra, Imane, Mehamal Bouchra, Tewfik Bekkouche i Lahcene Ziet. "Encryption face area in color images using Chaotic Maps". International Conference on Pioneer and Innovative Studies 1 (13.06.2023): 501–6. http://dx.doi.org/10.59287/icpis.880.
Pełny tekst źródłaWu, Jian. "Identity-Based Proxy Signcryption Schemes". Applied Mechanics and Materials 380-384 (sierpień 2013): 2605–8. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.2605.
Pełny tekst źródłaAbdul Hussien, Farah Tawfiq, Abdul Monem S. Rahma i Hala Bahjat Abdul Wahab. "A Secure Environment Using a New Lightweight AES Encryption Algorithm for E-Commerce Websites". Security and Communication Networks 2021 (24.12.2021): 1–15. http://dx.doi.org/10.1155/2021/9961172.
Pełny tekst źródłaAltameem, Ayman, Prabu P, Senthilnathan T, Ramesh Chandra Poonia i Abdul Khader Jilani Saudagar. "A Hybrid AES with a Chaotic Map-Based Biometric Authentication Framework for IoT and Industry 4.0". Systems 11, nr 1 (5.01.2023): 28. http://dx.doi.org/10.3390/systems11010028.
Pełny tekst źródłaFan, Lin Na, i Jun Liu. "A New Mechanism of Database Encryption". Applied Mechanics and Materials 135-136 (październik 2011): 87–91. http://dx.doi.org/10.4028/www.scientific.net/amm.135-136.87.
Pełny tekst źródłaM, Sreekala, i Varghese Paul. "A Novel Hybrid Encryption Method for Multimedia Encryption Using Elliptic Curve Cryptography and TDMRC". International Journal of Emerging Research in Management and Technology 6, nr 7 (29.06.2018): 1. http://dx.doi.org/10.23956/ijermt.v6i7.178.
Pełny tekst źródłaHuang, Yongzhong, Xueguang Bi, Yucheng Liu i Yuxia Li. "Development of a Novel Hyperchaos-Based Image Encryption Algorithm Consisting of Two Scrambling-Diffusion Operations". Complexity 2022 (4.10.2022): 1–15. http://dx.doi.org/10.1155/2022/8765268.
Pełny tekst źródłaBenzegane, S., S. Sadoudi i M. Djeddou. "Hyperchaos-Based Cryptosystem for Multimedia Data Security". Algerian Journal of Signals and Systems 1, nr 1 (1.02.2021): 47–58. http://dx.doi.org/10.51485/ajss.v1i1.18.
Pełny tekst źródłaM. Shafiq Surameery, Nigar. "Modified Advanced Encryption Standard for Boost Image Encryption". UHD Journal of Science and Technology 6, nr 1 (27.04.2022): 52–59. http://dx.doi.org/10.21928/uhdjst.v6n1y2022.pp52-59.
Pełny tekst źródłaSumanth N, Padmashree Anand, Shrinidhi Holla, Rakshatha S, Prajwal V S i Harshvardhan Tiwari. "Enhancement of 3-d pythocrypt using aes technique by generating the key using chitra kavya". South Asian Journal of Engineering and Technology 12, nr 3 (8.07.2022): 54–60. http://dx.doi.org/10.26524/sajet.2022.12.38.
Pełny tekst źródłaShao, Yu. "Image encryption algorithm for torsional components of generator based on compound chaotic model". Thermal Science 24, nr 3 Part A (2020): 1473–80. http://dx.doi.org/10.2298/tsci190717078s.
Pełny tekst źródłaIrwanto, Dola. "File Encryption and Decryption Using Algorithm Aes-128 Bit Based Website". MALCOM: Indonesian Journal of Machine Learning and Computer Science 4, nr 2 (1.04.2024): 670–77. http://dx.doi.org/10.57152/malcom.v4i2.1305.
Pełny tekst źródłaMyasnikov, K. P., S. A. Mikaeva i Yu A. Zhuravleva. "MICROCONTROLLERS PROGRAMMING BASED ON THE PROGRAMMING LANGUAGE". Spravochnik. Inzhenernyi zhurnal, nr 315 (czerwiec 2023): 52–56. http://dx.doi.org/10.14489/hb.2023.06.pp.052-056.
Pełny tekst źródłaREN, YANLI, DAWU GU, SHUOZHONG WANG i XINPENGU ZHANG. "HIERARCHICAL IDENTITY-BASED PROXY RE-ENCRYPTION WITHOUT RANDOM ORACLES". International Journal of Foundations of Computer Science 21, nr 06 (grudzień 2010): 1049–63. http://dx.doi.org/10.1142/s0129054110007726.
Pełny tekst źródła