Artykuły w czasopismach na temat „Symmetric encryption techniques”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Symmetric encryption techniques”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Parenreng, Jumadi Mabe, Sahraeni Maulida Mustari i Abdul Wahid. "E-mail Security System Using El-Gamal Hybrid Algorithm and AES (Advanced Encryption Standard) Algorithm". Internet of Things and Artificial Intelligence Journal 2, nr 1 (16.02.2022): 1–9. http://dx.doi.org/10.31763/iota.v2i1.510.
Pełny tekst źródłaMalhotra, Anoushka, Ashwin Arora i Dr Manjot Kaur Bhatia. "Symmetric Cryptographic Approaches". International Journal for Research in Applied Science and Engineering Technology 10, nr 12 (31.12.2022): 718–21. http://dx.doi.org/10.22214/ijraset.2022.47982.
Pełny tekst źródłaChowdhary, Chiranji Lal, Pushpam Virenbhai Patel, Krupal Jaysukhbhai Kathrotia, Muhammad Attique, Kumaresan Perumal i Muhammad Fazal Ijaz. "Analytical Study of Hybrid Techniques for Image Encryption and Decryption". Sensors 20, nr 18 (10.09.2020): 5162. http://dx.doi.org/10.3390/s20185162.
Pełny tekst źródłaM, Sreekala, i Varghese Paul. "A Novel Hybrid Encryption Method for Multimedia Encryption Using Elliptic Curve Cryptography and TDMRC". International Journal of Emerging Research in Management and Technology 6, nr 7 (29.06.2018): 1. http://dx.doi.org/10.23956/ijermt.v6i7.178.
Pełny tekst źródłaPushpendra, Tiwari. "A study and comparison of the various cryptography technique standards within fifteen factors". i-manager's Journal on Digital Forensics & Cyber Security 1, nr 1 (2023): 21. http://dx.doi.org/10.26634/jdf.1.1.19134.
Pełny tekst źródłaKuppuswamy, Prakash, Saeed Qasim Yahya Al Khalidi Al-Maliki, Rajan John, Mohammad Haseebuddin i Ahmed Ali Shaik Meeran. "A hybrid encryption system for communication and financial transactions using RSA and a novel symmetric key algorithm". Bulletin of Electrical Engineering and Informatics 12, nr 2 (1.04.2023): 1148–58. http://dx.doi.org/10.11591/eei.v12i2.4967.
Pełny tekst źródłaAhamad, Md Martuza, i Md Ibrahim Abdullah. "Comparison of Encryption Algorithms for Multimedia". Rajshahi University Journal of Science and Engineering 44 (19.11.2016): 131–39. http://dx.doi.org/10.3329/rujse.v44i0.30398.
Pełny tekst źródłaZhu, Bingxin, Puwen Wei i Mingqiang Wang. "Adaptive Security of Broadcast Encryption, Revisited". Security and Communication Networks 2017 (2017): 1–16. http://dx.doi.org/10.1155/2017/1404279.
Pełny tekst źródłaParveen Sehgal, Satinder ,. "Design a Hybrid Algorithm for Data Encryption to Implementation in Database". Tuijin Jishu/Journal of Propulsion Technology 44, nr 4 (16.10.2023): 1328–37. http://dx.doi.org/10.52783/tjjpt.v44.i4.1037.
Pełny tekst źródłaUbaidullah, Mohammad, i Qahtan Makki. "A Review on Symmetric Key Encryption Techniques in Cryptography". International Journal of Computer Applications 147, nr 10 (16.08.2016): 43–48. http://dx.doi.org/10.5120/ijca2016911203.
Pełny tekst źródłaThomas, Ambili, i V. Lakshmi Narasimhan. "Symmetric and Asymmetric Encryption Algorithm Modeling on CPU Execution Time as Employed Over a Mobile Environment". International Journal of Natural Computing Research 10, nr 2 (kwiecień 2021): 21–41. http://dx.doi.org/10.4018/ijncr.2021040102.
Pełny tekst źródłaParthasarathy, Rajamohan, Seow Soon Loong i Preethy Ayyappan. "An Efficient Encryption Implementation Using AES Algorithm Techniques". Journal of Engineering & Technological Advances 3, nr 1 (2018): 61–70. http://dx.doi.org/10.35934/segi.v3i1.61.
Pełny tekst źródłaDhiman, Oshin, i Anand Sharma. "Enhancement for Secured File Storage Using Modern Hybrid Cryptography". International Journal on Future Revolution in Computer Science & Communication Engineering 8, nr 1 (31.03.2022): 01–07. http://dx.doi.org/10.17762/ijfrcsce.v8i1.2083.
Pełny tekst źródłaChandrakala B M, Latha A P, B. V. Shruti. "Optimizing the Application of Hybrid Cryptographic Methods for Secure File Storage and Retrieval". Tuijin Jishu/Journal of Propulsion Technology 44, nr 4 (27.10.2023): 2126–33. http://dx.doi.org/10.52783/tjjpt.v44.i4.1191.
Pełny tekst źródłaBenyahia, Kadda, Meftah Mustapha i Latreche Abdelkrim. "A Bio-Inspired Algorithm for Symmetric Encryption". International Journal of Organizational and Collective Intelligence 10, nr 1 (styczeń 2020): 1–13. http://dx.doi.org/10.4018/ijoci.2020010101.
Pełny tekst źródłaAbdElminaam, DiaaSalama, Hatem M. Abdul Kader, Mohie M. Hadhoud i Salah M. El-Sayed. "Developing and Evaluation of New Hybrid Encryption Algorithms". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 13, nr 1 (28.03.2014): 4038–52. http://dx.doi.org/10.24297/ijct.v13i1.2926.
Pełny tekst źródłaHaryono, Wasis. "Comparison Encryption of How to Work Caesar Cipher, Hill Cipher, Blowfish and Twofish". Data Science: Journal of Computing and Applied Informatics 4, nr 2 (31.07.2020): 100–110. http://dx.doi.org/10.32734/jocai.v4.i2-4004.
Pełny tekst źródłaJabir, Hawraa. "An Overview of Parallel Symmetric Cipher of Messages". JOURNAL OF UNIVERSITY OF BABYLON for Pure and Applied Sciences 31, nr 2 (29.06.2023): 19–33. http://dx.doi.org/10.29196/jubpas.v31i2.4652.
Pełny tekst źródła., Sonika, Sandeep Kumar Arora i Mahedi Masud. "Review on Security Based Vehicular Ad-Hoc Network". International Journal of Engineering & Technology 7, nr 3.8 (7.07.2018): 125. http://dx.doi.org/10.14419/ijet.v7i3.8.16846.
Pełny tekst źródłaRabie, A., Kh El Shafie, A. Hammuoda i M. Rohiem. "Data ecryption based on multi-order FrFT, and FPGA implementation of DES algorith". International Journal of Reconfigurable and Embedded Systems (IJRES) 9, nr 2 (1.07.2020): 141. http://dx.doi.org/10.11591/ijres.v9.i2.pp141-152.
Pełny tekst źródłaAminudin, Nur, Andino Maseleno, Shankar K, S. Hemalatha, K. Sathesh kumar, Fauzi ., Rita Irviani i Muhamad Muslihudin. "Nur Algorithm on Data Encryption and Decryption". International Journal of Engineering & Technology 7, nr 2.26 (7.05.2018): 109. http://dx.doi.org/10.14419/ijet.v7i2.26.14363.
Pełny tekst źródłaManiyath, Shima Ramesh, i Thanikaiselvan V. "A novel efficient multiple encryption algorithm for real time images". International Journal of Electrical and Computer Engineering (IJECE) 10, nr 2 (1.04.2020): 1327. http://dx.doi.org/10.11591/ijece.v10i2.pp1327-1336.
Pełny tekst źródłaTumati, Gowtham, Yalamarthi Rajesh, Manogna T i J. Ram Kumar. "A New Encryption Algorithm Using Symmetric Key Cryptography". International Journal of Engineering & Technology 7, nr 2.32 (31.05.2018): 436. http://dx.doi.org/10.14419/ijet.v7i2.32.15734.
Pełny tekst źródłaKuppuswamy, Prakash, i Dr Saeed Q Y Al-Khalidi. "IMPLEMENTATION OF SECURITY THROUGH SIMPLE SYMMETRIC KEY ALGORITHM BASED ON MODULO 37". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 3, nr 2 (30.10.2012): 335–38. http://dx.doi.org/10.24297/ijct.v3i2c.2896.
Pełny tekst źródłaHe, Wei, Yu Zhang i Yin Li. "Fast, Searchable, Symmetric Encryption Scheme Supporting Ranked Search". Symmetry 14, nr 5 (18.05.2022): 1029. http://dx.doi.org/10.3390/sym14051029.
Pełny tekst źródłaGui, Zichen, Kenneth G. Paterson, Sikhar Patranabis i Bogdan Warinschi. "SWiSSSE: System-Wide Security for Searchable Symmetric Encryption". Proceedings on Privacy Enhancing Technologies 2024, nr 1 (styczeń 2024): 549–81. http://dx.doi.org/10.56553/popets-2024-0032.
Pełny tekst źródłaKour, Avleen. "Secure Authentication in Cloud Computing using Diffie Hellman and One Time Password". International Journal for Research in Applied Science and Engineering Technology 9, nr VI (30.06.2021): 4375–80. http://dx.doi.org/10.22214/ijraset.2021.36037.
Pełny tekst źródłaHarba, E. S. I. "Secure Data Encryption Through a Combination of AES, RSA and HMAC". Engineering, Technology & Applied Science Research 7, nr 4 (9.08.2017): 1781–85. http://dx.doi.org/10.48084/etasr.1272.
Pełny tekst źródłaBerisha, Artan, i Hektor Kastrati. "Parallel impelementation of RC6 algorithm". Journal of Computer Science and Technology Studies 3, nr 2 (26.06.2021): 01–09. http://dx.doi.org/10.32996/jcsts.2021.3.2.1.
Pełny tekst źródłaVennela, Vasireddy. "Lightweight Cryptography Algorithms for IOT Devices". International Journal for Research in Applied Science and Engineering Technology 9, nr VI (20.06.2021): 1678–83. http://dx.doi.org/10.22214/ijraset.2021.35358.
Pełny tekst źródłaDhakne, Dr Amol, Prasann Shimpi, Sanket Halake, Shivam Dharmshetti i Shashank Singh. "Neural Network Based Message Concealment Scheme". International Journal for Research in Applied Science and Engineering Technology 10, nr 5 (31.05.2022): 1368–78. http://dx.doi.org/10.22214/ijraset.2022.42522.
Pełny tekst źródłaRaja, S. P. "Multiscale transform-based secured joint efficient medical image compression-encryption using symmetric key cryptography and ebcot encoding technique". International Journal of Wavelets, Multiresolution and Information Processing 17, nr 05 (wrzesień 2019): 1950034. http://dx.doi.org/10.1142/s0219691319500346.
Pełny tekst źródłaVergoossen, Tom, Robert Bedington, James A. Grieve i Alexander Ling. "Satellite Quantum Communications When Man-in-the-Middle Attacks Are Excluded". Entropy 21, nr 4 (10.04.2019): 387. http://dx.doi.org/10.3390/e21040387.
Pełny tekst źródłaVerma, Saurav, Mahek Pokharna i Vishal Mishra. "Identifying and analyzing Risk Mitigation strategies in IOT devices using Light Weight Symmetric Encryption Algorithms". International Journal for Research in Applied Science and Engineering Technology 10, nr 9 (30.09.2022): 638–46. http://dx.doi.org/10.22214/ijraset.2022.46697.
Pełny tekst źródłaKaushik, Bharti, Vikas Malik i Vinod Saroha. "A Review Paper on Data Encryption and Decryption". International Journal for Research in Applied Science and Engineering Technology 11, nr 4 (30.04.2023): 1986–92. http://dx.doi.org/10.22214/ijraset.2023.50101.
Pełny tekst źródłaLai, Jian-Foo, i Swee-Huay Heng. "Secure File Storage On Cloud Using Hybrid Cryptography". Journal of Informatics and Web Engineering 1, nr 2 (15.09.2022): 1–18. http://dx.doi.org/10.33093/jiwe.2022.1.2.1.
Pełny tekst źródłaAlothman, Raya Basil, Imad Ibraheem Saada i Basma Salim Bazel Al-Brge. "A Performance-Based Comparative Encryption and Decryption Technique for Image and Video for Mobile Computing". Journal of Cases on Information Technology 24, nr 2 (kwiecień 2022): 1–18. http://dx.doi.org/10.4018/jcit.20220101.oa1.
Pełny tekst źródłaPark, Juhyun, i Yongsu Park. "Symmetric-Key Cryptographic Routine Detection in Anti-Reverse Engineered Binaries Using Hardware Tracing". Electronics 9, nr 6 (8.06.2020): 957. http://dx.doi.org/10.3390/electronics9060957.
Pełny tekst źródłaBhandari, Ashok Singh. "Analysis of Computational Algebra for Cryptography and Coding Theory Applications". Mathematical Statistician and Engineering Applications 70, nr 1 (31.01.2021): 598–606. http://dx.doi.org/10.17762/msea.v70i1.2513.
Pełny tekst źródłaYesin, V. I., i V. V. Vilihura. "Research on the main methods and schemes of encryption with search capability". Radiotekhnika, nr 209 (24.06.2022): 138–55. http://dx.doi.org/10.30837/rt.2022.2.209.14.
Pełny tekst źródłaKovalchuk, A. M., Yuriy Peleckh i Tetiana Bubela. "BIT OPERATIONS WITH ELEMENTS OF THE RSA ALGORITHM IN ENCRYPTION-DECRYPTION OF COLOR IMAGES". Measuring Equipment and Metrology 83, nr 3 (2022): 5–10. http://dx.doi.org/10.23939/istcmtm2022.03.005.
Pełny tekst źródłaAdy Putra, Wahyu, Suyanto Suyanto i Muhammad Zarlis. "Performance Analysis Of The Combination Of Advanced Encryption Standard Cryptography Algorithms With Luc For Text Security". SinkrOn 8, nr 2 (6.04.2023): 890–97. http://dx.doi.org/10.33395/sinkron.v8i2.12202.
Pełny tekst źródłaSeelamanthula Sreenivasu, Et al. "DAR Model: A Novel Symmetric Key Enabled Security architecture for reliable data transfer in Wireless Sensor Networks". International Journal on Recent and Innovation Trends in Computing and Communication 11, nr 10 (2.11.2023): 717–28. http://dx.doi.org/10.17762/ijritcc.v11i10.8568.
Pełny tekst źródłaHanin, Charifa, Fouzia Omary, Souad Elbernoussi, Khadija Achkoun i Bouchra Echandouri. "A New Block Cipher System Using Cellular Automata and Ant Colony Optimization (BC-CaACO)". International Journal of Information Security and Privacy 12, nr 4 (październik 2018): 54–67. http://dx.doi.org/10.4018/ijisp.2018100104.
Pełny tekst źródłaAlmaiah, Mohammed Amin, Ziad Dawahdeh, Omar Almomani, Adeeb Alsaaidah, Ahmad Al-Khasawneh i Saleh Khawatreh. "A new hybrid text encryption approach over mobile ad hoc network". International Journal of Electrical and Computer Engineering (IJECE) 10, nr 6 (1.12.2020): 6461. http://dx.doi.org/10.11591/ijece.v10i6.pp6461-6471.
Pełny tekst źródłaJasim, Khalid F., Reem J. Ismail, Abdullah A. Nahi Al-Rabeeah i Soma Solaimanzadeh. "Analysis the Structures of Some Symmetric Cipher Algorithms Suitable for the Security of IoT Devices". Cihan University-Erbil Scientific Journal 5, nr 2 (1.09.2021): 13–19. http://dx.doi.org/10.24086/cuesj.v5n2y2021.pp13-19.
Pełny tekst źródłaSholikhatin, Siti Alvi, Adam Prayogo Kuncoro, Afifah Lutfia Munawaroh i Gilang Aji Setiawan. "Comparative Study of RSA Asymmetric Algorithm and AES Algorithm for Data Security". Edu Komputika Journal 9, nr 1 (11.01.2023): 60–67. http://dx.doi.org/10.15294/edukomputika.v9i1.57389.
Pełny tekst źródłaWang, Peng, i Xiang Li. "TEDL: A Text Encryption Method Based on Deep Learning". Applied Sciences 11, nr 4 (17.02.2021): 1781. http://dx.doi.org/10.3390/app11041781.
Pełny tekst źródłaM. Subhashini, K. Shankar,. "Hybrid Encryption based Access Control Approach for Securing Cloud Computing". International Journal on Recent and Innovation Trends in Computing and Communication 11, nr 9 (30.10.2023): 1056–63. http://dx.doi.org/10.17762/ijritcc.v11i9.8998.
Pełny tekst źródłaChatterjee, Runa, Rajdeep Chakraborty i Mondal J.K. "DESIGN OF LIGHTWEIGHT CRYPTOGRAPHIC MODEL FOR END-TO-END ENCRYPTION IN IOT DOMAIN". IRO Journal on Sustainable Wireless Systems 1, nr 04 (8.12.2019): 215–24. http://dx.doi.org/10.36548/jsws.2019.4.002.
Pełny tekst źródła