Artigos de revistas sobre o tema "Advanced cryptographic techniques"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores artigos de revistas para estudos sobre o assunto "Advanced cryptographic techniques".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os artigos de revistas das mais diversas áreas científicas e compile uma bibliografia correta.
Abudalou, Mohammad. "Enhancing Data Security through Advanced Cryptographic Techniques". International Journal of Computer Science and Mobile Computing 13, n.º 1 (30 de janeiro de 2024): 88–92. http://dx.doi.org/10.47760/ijcsmc.2024.v13i01.007.
Texto completo da fonteKarantjias, Athanasios, e Nineta Polemi. "Assessment of advanced cryptographic antiviral techniques". International Journal of Electronic Security and Digital Forensics 3, n.º 1 (2010): 60. http://dx.doi.org/10.1504/ijesdf.2010.032331.
Texto completo da fonteViresh, Kasheenath Babaleshwar, Karade Sinchana, N. Sakshi e Naidu Anush. "Audio encryption and decryption using AES algorithm technique". i-manager’s Journal on Electronics Engineering 14, n.º 2 (2024): 8. http://dx.doi.org/10.26634/jele.14.2.20486.
Texto completo da fonteLewis, Nehama, Yaron Connelly, Gil Henkin, Max Leibovich e Adi Akavia. "Factors Influencing the Adoption of Advanced Cryptographic Techniques for Data Protection of Patient Medical Records". Healthcare Informatics Research 28, n.º 2 (30 de abril de 2022): 132–42. http://dx.doi.org/10.4258/hir.2022.28.2.132.
Texto completo da fonteHieu, Phan Duong, e Moti Yung. "PRIVACY IN ADVANCED CRYPTOGRAPHIC PROTOCOLS: PROTOTYPICAL EXAMPLES". Journal of Computer Science and Cybernetics 37, n.º 4 (12 de outubro de 2021): 429–51. http://dx.doi.org/10.15625/1813-9663/37/4/16104.
Texto completo da fonteMalhotra, Anoushka, Ashwin Arora e Dr Manjot Kaur Bhatia. "Symmetric Cryptographic Approaches". International Journal for Research in Applied Science and Engineering Technology 10, n.º 12 (31 de dezembro de 2022): 718–21. http://dx.doi.org/10.22214/ijraset.2022.47982.
Texto completo da fonteSingh, Sukhveer. "Investigation of Cryptography for Secure Communication and Data Privacy Applications". Mathematical Statistician and Engineering Applications 70, n.º 1 (31 de janeiro de 2021): 551–60. http://dx.doi.org/10.17762/msea.v70i1.2508.
Texto completo da fonteMark Espalmado, John, e Edwin Arboleda. "DARE Algorithm: A New Security Protocol by Integration of Different Cryptographic Techniques". International Journal of Electrical and Computer Engineering (IJECE) 7, n.º 2 (1 de abril de 2017): 1032. http://dx.doi.org/10.11591/ijece.v7i2.pp1032-1041.
Texto completo da fonteFeilu Hang, Et al. "Design Of Intelligent Countermeasure System for Power System Network Security Defense". Journal of Electrical Systems 19, n.º 4 (25 de janeiro de 2024): 227–40. http://dx.doi.org/10.52783/jes.635.
Texto completo da fonteParthasarathy, Rajamohan, Seow Soon Loong e Preethy Ayyappan. "An Efficient Encryption Implementation Using AES Algorithm Techniques". Journal of Engineering & Technological Advances 3, n.º 1 (2018): 61–70. http://dx.doi.org/10.35934/segi.v3i1.61.
Texto completo da fonteR, Mr Suresh. "A Survey on Quantum-Cryptographic Image Encryption for Secure Storage". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, n.º 04 (3 de abril de 2024): 1–5. http://dx.doi.org/10.55041/ijsrem29461.
Texto completo da fonteSundararajan, Ananiah Durai Durai, e Rajashree R. "A Comprehensive Survey on Lightweight Asymmetric Key Cryptographic Algorithm for Resource Constrained Devices". ECS Transactions 107, n.º 1 (24 de abril de 2022): 7457–68. http://dx.doi.org/10.1149/10701.7457ecst.
Texto completo da fonteAnkita Srivastava. "Performance Evaluation of Genetic Algorithm-Driven Blockchain Encryption for EHR Management and Validation". Journal of Electrical Systems 20, n.º 7s (4 de maio de 2024): 1726–39. http://dx.doi.org/10.52783/jes.3773.
Texto completo da fonteSultan, Abid, Yao Lin e Azhar Mushtaq. "A Survey Paper on ASCII-Based Cryptographic Techniques". Vol 4 Issue 4 4, n.º 4 (17 de dezembro de 2022): 1087–98. http://dx.doi.org/10.33411/ijist/2022040411.
Texto completo da fonteWaheed, Adil, Fazli Subhan, Mazliham Mohd Suud, Muhammad Yasir Hayat Malik, Alina Mirza e Farkhanda Afzal. "Construction of nonlinear component of block cipher using coset graph". AIMS Mathematics 8, n.º 9 (2023): 21644–67. http://dx.doi.org/10.3934/math.20231104.
Texto completo da fonteAbdElminaam, DiaaSalama, Hatem M. Abdul Kader, Mohie M. Hadhoud e Salah M. El-Sayed. "Developing and Evaluation of New Hybrid Encryption Algorithms". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 13, n.º 1 (28 de março de 2014): 4038–52. http://dx.doi.org/10.24297/ijct.v13i1.2926.
Texto completo da fonteParenreng, Jumadi Mabe, Sahraeni Maulida Mustari e Abdul Wahid. "E-mail Security System Using El-Gamal Hybrid Algorithm and AES (Advanced Encryption Standard) Algorithm". Internet of Things and Artificial Intelligence Journal 2, n.º 1 (16 de fevereiro de 2022): 1–9. http://dx.doi.org/10.31763/iota.v2i1.510.
Texto completo da fonteSai D, Jagadeesh, e Krishnaraj P M. "Cryptographic Interweaving of Messages". International Journal of Data Informatics and Intelligent Computing 2, n.º 1 (24 de março de 2023): 42–50. http://dx.doi.org/10.59461/ijdiic.v2i1.38.
Texto completo da fonteLimniotis, Konstantinos. "Cryptography as the Means to Protect Fundamental Human Rights". Cryptography 5, n.º 4 (30 de novembro de 2021): 34. http://dx.doi.org/10.3390/cryptography5040034.
Texto completo da fonteKumar, Dilip, e Manoj Kumar. "Hybrid Cryptographic Approach for Data Security Using Elliptic Curve Cryptography for IoT". International Journal of Computer Network and Information Security 16, n.º 2 (8 de abril de 2024): 42–54. http://dx.doi.org/10.5815/ijcnis.2024.02.04.
Texto completo da fonteGowda, V. Dankan, D. Palanikkumar, Sajja Suneel, Satish Dekka, T. Thiruvenkadam e K. D. V. Prasad. "Cryptographic image-based data security strategies in wireless sensor networks". Journal of Discrete Mathematical Sciences and Cryptography 27, n.º 2 (2024): 293–304. http://dx.doi.org/10.47974/jdmsc-1883.
Texto completo da fonteShah, Aayush, Prabhat Mahato e Aadarsh Bhagat. "Enhancing Post-Quantum Cryptography: Exploring Mathematical Foundations and Comparative Analysis of Different Cryptographic Algorithm". International Journal for Research in Applied Science and Engineering Technology 11, n.º 8 (31 de agosto de 2023): 1626–42. http://dx.doi.org/10.22214/ijraset.2023.55341.
Texto completo da fonteLiang, Yuheng. "A research on applications of neural network-based cryptography". Applied and Computational Engineering 14, n.º 1 (23 de outubro de 2023): 258–64. http://dx.doi.org/10.54254/2755-2721/14/20230798.
Texto completo da fonteAdy Putra, Wahyu, Suyanto Suyanto e Muhammad Zarlis. "Performance Analysis Of The Combination Of Advanced Encryption Standard Cryptography Algorithms With Luc For Text Security". SinkrOn 8, n.º 2 (6 de abril de 2023): 890–97. http://dx.doi.org/10.33395/sinkron.v8i2.12202.
Texto completo da fonteAzhari, Rama, e Agita Nisa Salsabila. "Analyzing the Impact of Quantum Computing on Current Encryption Techniques". IAIC Transactions on Sustainable Digital Innovation (ITSDI) 5, n.º 2 (22 de fevereiro de 2024): 148–57. http://dx.doi.org/10.34306/itsdi.v5i2.662.
Texto completo da fonteSubbarayudu, Yerragudipadu, Gurram Vijendar Reddy, Merugu Shankar, Mailagani Ven, P. K. Abhilash e Archana Sehgal. "Cipher Craft: Design and Analysis of Advanced Cryptographic Techniques for Secure Communication Systems". MATEC Web of Conferences 392 (2024): 01112. http://dx.doi.org/10.1051/matecconf/202439201112.
Texto completo da fonteL, Shammi. "Advancing Privacy and Confidentiality in the Digital Healthcare Era: The Image Encryption Solution". International Journal of Innovative Research in Information Security 10, n.º 04 (8 de maio de 2024): 133–38. http://dx.doi.org/10.26562/ijiris.2024.v1004.03.
Texto completo da fonteOukili, Soufiane, e Seddik Bri. "Hardware Implementation of AES Algorithm with Logic S-box". Journal of Circuits, Systems and Computers 26, n.º 09 (24 de abril de 2017): 1750141. http://dx.doi.org/10.1142/s0218126617501419.
Texto completo da fonteOlayah, Fekry, Mohammed Al Yami, Hamad Ali Abosaq, Yahya Ali Abdelrahman Ali, Md Ashraf Siddiqui, Reyazur Rashid Irshad, Samreen Shahwar, Asharul Islam e Rafia Sultana. "An Efficient Lightweight Crypto Security Module for Protecting Data Transmission Through IOT Based Electronic Sensors". Journal of Nanoelectronics and Optoelectronics 19, n.º 6 (1 de junho de 2024): 646–57. http://dx.doi.org/10.1166/jno.2024.3609.
Texto completo da fonteN, Swaroop KUMAR. "Encryption with DNA: The Manipulation of DNA to Deal with the Cyber Security Attacks". ECS Transactions 107, n.º 1 (24 de abril de 2022): 8311–20. http://dx.doi.org/10.1149/10701.8311ecst.
Texto completo da fonteNirmala, Endar. "Penerapan Steganografi File Gambar Menggunakan Metode Least Significant Bit (LSB) dan Algoritma Kriptografi Advanced Encryption Standard (AES) Berbasis Android". Jurnal Informatika Universitas Pamulang 5, n.º 1 (31 de março de 2020): 36. http://dx.doi.org/10.32493/informatika.v5i1.4646.
Texto completo da fonteAhmad, Ashraf, Yousef AbuHour, Remah Younisse, Yasmeen Alslman, Eman Alnagi e Qasem Abu Al-Haija. "MID-Crypt: A Cryptographic Algorithm for Advanced Medical Images Protection". Journal of Sensor and Actuator Networks 11, n.º 2 (13 de maio de 2022): 24. http://dx.doi.org/10.3390/jsan11020024.
Texto completo da fonteGowda, V. Dankan, Pratik Gite, Mirzanur Rahman, Kirti Rahul Kadam, G. Manivasagam e K. D. V. Prasad. "Novel approaches to biometric security using enhanced session keys and elliptic curve cryptography". Journal of Discrete Mathematical Sciences and Cryptography 27, n.º 2 (2024): 477–88. http://dx.doi.org/10.47974/jdmsc-1884.
Texto completo da fonteSobia Sattar. "Cryptographic Compression Techniques along with some Penetrating Attacks and Possible Security Measures". Lahore Garrison University Research Journal of Computer Science and Information Technology 4, n.º 2 (25 de junho de 2020): 43–57. http://dx.doi.org/10.54692/lgurjcsit.2020.0402133.
Texto completo da fonteChorosinski, Len, Venky Sundaram, Klaus Wolter, Richard Calatayud, Parrish Ralston, Scott Suko, David Fry e Nathanael Ellerhoff. "Supply Chain Hardware Integrity for Electronics Defense (SHIELD) Using Small “Dielets”". International Symposium on Microelectronics 2017, n.º 1 (1 de outubro de 2017): 000699–704. http://dx.doi.org/10.4071/isom-2017-thp21_112.
Texto completo da fonteGosavi, Mr Abhijeet, Mr Sakib Shaikh, Mr Adnan Sayyed, Mr Somesh Sapa, Mr Ayan Shaikh e Prof A. A. Pund. "Enabling Encrypted Cloud Emails with Data Encryption using Advanced Encryption Techniques". International Journal for Research in Applied Science and Engineering Technology 11, n.º 6 (30 de junho de 2023): 864–69. http://dx.doi.org/10.22214/ijraset.2023.53709.
Texto completo da fonteBuddha, Govind Prasad. "Leveraging Cryptographic Hash Functions for Credit Card Fraud Detection". International Journal of Recent Technology and Engineering (IJRTE) 13, n.º 1 (30 de maio de 2024): 16–21. http://dx.doi.org/10.35940/ijrte.f8019.13010524.
Texto completo da fonteSaha, Ankita, Chanda Pathak e Sourav Saha. "A Study of Machine Learning Techniques in Cryptography for Cybersecurity". American Journal of Electronics & Communication 1, n.º 4 (7 de junho de 2021): 22–26. http://dx.doi.org/10.15864/ajec.1404.
Texto completo da fonteVivek Tammineedi, Venkata Satya, e V. N. Rajavarman. "A Novel Analysis of Advanced Visual Cryptography Techniques for Providing Security Against Web Attacks Using Support Vector Machine Technique". Journal of Computational and Theoretical Nanoscience 17, n.º 5 (1 de maio de 2020): 2097–114. http://dx.doi.org/10.1166/jctn.2020.8855.
Texto completo da fontePeng, Sheng, Linkai Zhu, Shanwen Hu, Zhiming Cai e Wenjian Liu. "Enhancing Global Blockchain Privacy via a Digital Mutual Trust Mechanism". Mathematics 12, n.º 10 (10 de maio de 2024): 1481. http://dx.doi.org/10.3390/math12101481.
Texto completo da fonteGobinathan, B., M. A. Mukunthan, S. Surendran, K. Somasundaram, Syed Abdul Moeed, P. Niranjan, V. Gouthami et al. "A Novel Method to Solve Real Time Security Issues in Software Industry Using Advanced Cryptographic Techniques". Scientific Programming 2021 (28 de dezembro de 2021): 1–9. http://dx.doi.org/10.1155/2021/3611182.
Texto completo da fonteShakya, Subarna, e Sanjita Lamichhane. "Secured Crypto Stegano Data Hiding Using Least Significant Bit Substitution and Encryption". Journal of Advanced College of Engineering and Management 2 (29 de novembro de 2016): 105. http://dx.doi.org/10.3126/jacem.v2i0.16103.
Texto completo da fonteKumar, Boddupalli Anvesh, e V. Bapuji. "Efficient privacy preserving communication protocol for IOT applications". Brazilian Journal of Development 10, n.º 1 (5 de janeiro de 2024): 402–19. http://dx.doi.org/10.34117/bjdv10n1-025.
Texto completo da fonteSinaga, Nurainun Hasanah, e Muhammad Syahrizal. "Implementasi Algoritma Mars Pada Pengamanan SMS". JURIKOM (Jurnal Riset Komputer) 7, n.º 3 (14 de junho de 2020): 398. http://dx.doi.org/10.30865/jurikom.v7i3.2175.
Texto completo da fonteC.Kanmani Pappa. "Zero-Trust Cryptographic Protocols and Differential Privacy Techniques for Scalable Secure Multi-Party Computation in Big Data Analytics". Journal of Electrical Systems 20, n.º 5s (13 de abril de 2024): 2114–23. http://dx.doi.org/10.52783/jes.2550.
Texto completo da fontevan Gastel, Bernard E., Bart Jacobs e Jean Popma. "Data Protection Using Polymorphic Pseudonymisation in a Large-Scale Parkinson’s Disease Study". Journal of Parkinson's Disease 11, s1 (16 de julho de 2021): S19—S25. http://dx.doi.org/10.3233/jpd-202431.
Texto completo da fonteDhiman, Oshin, e Anand Sharma. "Enhancement for Secured File Storage Using Modern Hybrid Cryptography". International Journal on Future Revolution in Computer Science & Communication Engineering 8, n.º 1 (31 de março de 2022): 01–07. http://dx.doi.org/10.17762/ijfrcsce.v8i1.2083.
Texto completo da fonteMoldamurat, Khuralay, Yerzhan Seitkulov, Sabyrzhan Atanov, Makhabbat Bakyt e Banu Yergaliyeva. "Enhancing cryptographic protection, authentication, and authorization in cellular networks: a comprehensive research study". International Journal of Electrical and Computer Engineering (IJECE) 14, n.º 1 (1 de fevereiro de 2024): 479. http://dx.doi.org/10.11591/ijece.v14i1.pp479-487.
Texto completo da fonteOlaniyan, Olatayo Moses, Ayobami Taiwo Olusesi, Bolaji Abigail Omodunbi, Wajeed Bolanle Wahab, Olusogo Julius Adetunji e Bamidele Musiliu Olukoya. "A Data Security Model for Mobile Ad Hoc Network Using Linear Function Mayfly Advanced Encryption Standard". International Journal of Emerging Technology and Advanced Engineering 13, n.º 3 (1 de março de 2023): 101–10. http://dx.doi.org/10.46338/ijetae0323_10.
Texto completo da fonteAlthobaiti, Hamad, e Ahmed Adas. "Simulation of Elliptical Curve Cryptography in IPSec on Ad-Hoc Networks". European Journal of Engineering and Formal Sciences 6, n.º 1 (4 de abril de 2023): 1–26. http://dx.doi.org/10.26417/687zrj13.
Texto completo da fonte