Literatura científica selecionada sobre o tema "Encryption"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "Encryption".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Artigos de revistas sobre o assunto "Encryption"
Sun, Chenbo. "Comparative Study of RSA Encryption and Quantum Encryption". Theoretical and Natural Science 2, n.º 1 (20 de fevereiro de 2023): 121–25. http://dx.doi.org/10.54254/2753-8818/2/20220098.
Texto completo da fontePourasad, Yaghoub, Ramin Ranjbarzadeh e Abbas Mardani. "A New Algorithm for Digital Image Encryption Based on Chaos Theory". Entropy 23, n.º 3 (13 de março de 2021): 341. http://dx.doi.org/10.3390/e23030341.
Texto completo da fonteThabit, Zainab Hasan, Sadiq A. Mehdi e Bashar M. Nema. "Enhancing Color Image Security: Encryption with Dynamic Chaotic Three-Dimensional System and Robust Security Analysis". Al-Mustansiriyah Journal of Science 34, n.º 4 (30 de dezembro de 2023): 87–95. http://dx.doi.org/10.23851/mjs.v34i4.1411.
Texto completo da fonteEt. al., Jaichandran R,. "A Hybrid Encryption Model with Attribute Based Encryption and Advanced Encryption Standard Techniques". Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, n.º 2 (11 de abril de 2021): 334–36. http://dx.doi.org/10.17762/turcomat.v12i2.720.
Texto completo da fonteAlawi, Attaa R., e Nidaa F. Hassan. "A Proposal Video Encryption Using Light Stream Algorithm". Engineering and Technology Journal 39, n.º 1B (25 de março de 2021): 184–96. http://dx.doi.org/10.30684/etj.v39i1b.1689.
Texto completo da fonteZhu, Bingxin, Puwen Wei e Mingqiang Wang. "Adaptive Security of Broadcast Encryption, Revisited". Security and Communication Networks 2017 (2017): 1–16. http://dx.doi.org/10.1155/2017/1404279.
Texto completo da fonteZhang, Jian, e Yutong Zhang. "An Image Encryption Algorithm Based on Balanced Pixel and Chaotic Map". Mathematical Problems in Engineering 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/216048.
Texto completo da fonteNori, Ahmed S., e Ansam O. Abdulmajeed. "Design and implementation of Threefish cipher algorithm in PNG file". Sustainable Engineering and Innovation 3, n.º 2 (29 de maio de 2021): 79–91. http://dx.doi.org/10.37868/sei.v3i2.id131.
Texto completo da fonteAlslman, Yasmeen, Eman Alnagi, Ashraf Ahmad, Yousef AbuHour, Remah Younisse e Qasem Abu Al-haija. "Hybrid Encryption Scheme for Medical Imaging Using AutoEncoder and Advanced Encryption Standard". Electronics 11, n.º 23 (30 de novembro de 2022): 3967. http://dx.doi.org/10.3390/electronics11233967.
Texto completo da fonteAli Pitchay, Sakinah, Wail Abdo Ali Alhiagem, Farida Ridzuan e Sundresan Perumal. "Mobile Application Design for Protecting the Data in Cloud Using Enhanced Technique of Encryption". International Journal of Engineering & Technology 7, n.º 4.15 (7 de outubro de 2018): 98. http://dx.doi.org/10.14419/ijet.v7i4.15.21427.
Texto completo da fonteTeses / dissertações sobre o assunto "Encryption"
Yilmaz, Fatih Levent. "Video Encryption". Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-12604.
Texto completo da fonteAkdag, Sadik Bahaettin. "An Image Encryption Algorithm Robust To Post-encryption Bitrate Conversion". Master's thesis, METU, 2006. http://etd.lib.metu.edu.tr/upload/12607710/index.pdf.
Texto completo da fonteMeissner, Robert. "Data Encryption Standard". Universitätsbibliothek Chemnitz, 2002. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-200200590.
Texto completo da fonteSt-Jules, Michael. "Secure Quantum Encryption". Thesis, Université d'Ottawa / University of Ottawa, 2016. http://hdl.handle.net/10393/35371.
Texto completo da fonteFauzi, Prastudy. "On Fully Homomorphic Encryption". Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2012. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-18992.
Texto completo da fonteTopsholm, Max. "Transactional Data Encryption View". Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-147885.
Texto completo da fonteWang, Yongsheng. "Advanced video encryption techniques". Thesis, Queen's University Belfast, 2013. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.602966.
Texto completo da fonteKing, Kevin C. "Optimizing fully homomorphic encryption". Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/113156.
Texto completo da fonteThis electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 50-51).
Fully homomorphic encryption (FHE) presents the possibility of removing the need to trust cloud providers with plaintext data. We present two new FHE scheme variants of BGV'12, both of which remove the need for key switching after a ciphertext multiplication, overall halving the runtime of bootstrapping. We also present multiple implementations of 32-bit integer addition evaluation, the fastest of which spends 16 seconds computing the addition circuit and 278 seconds bootstrapping. We nd that bootstrapping consumes approximately 90% of the computation time for integer addition and secure parameter settings are currently bottlenecked by the memory size of commodity hardware.
by Kevin C. King.
M. Eng.
Banu, Pokhali Sayeda Roohi. "Satellite on-board encryption". Thesis, University of Surrey, 2007. http://epubs.surrey.ac.uk/774244/.
Texto completo da fonteAnicama, Jorge. "Prime numbers and encryption". Pontificia Universidad Católica del Perú, 2014. http://repositorio.pucp.edu.pe/index/handle/123456789/95565.
Texto completo da fonteLivros sobre o assunto "Encryption"
Ahmad, Khairol Amali Bin, Khaleel Ahmad e Uma N. Dulhare, eds. Functional Encryption. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-60890-3.
Texto completo da fonteWheeler, David. Block encryption. Cambridge: University of Cambridge Computer Laboratory, 1987.
Encontre o texto completo da fonteRen, Kui, e Cong Wang. Searchable Encryption. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-21377-9.
Texto completo da fonteFatal encryption. Port Moody, B.C: Gypsy Moon Press, 2008.
Encontre o texto completo da fonteKoç, Çetin Kaya, Funda Özdemir e Zeynep Ödemiş Özger. Partially Homomorphic Encryption. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-87629-6.
Texto completo da fonteBiryukov, Alex, ed. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-74619-5.
Texto completo da fonteCanteaut, Anne, ed. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34047-5.
Texto completo da fonteLeander, Gregor, ed. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-48116-5.
Texto completo da fontePreneel, Bart, ed. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 1995. http://dx.doi.org/10.1007/3-540-60590-8.
Texto completo da fonteGollmann, Dieter, ed. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 1996. http://dx.doi.org/10.1007/3-540-60865-6.
Texto completo da fonteCapítulos de livros sobre o assunto "Encryption"
Krähenbühl, Cyrill, e Adrian Perrig. "Searchable Symmetric Encryption". In Trends in Data Protection and Encryption Technologies, 71–75. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_14.
Texto completo da fonteBuchanan, W. J. "Encryption". In The Complete Handbook of the Internet, 731–57. Boston, MA: Springer US, 2002. http://dx.doi.org/10.1007/978-0-306-48331-8_35.
Texto completo da fonteCarter, Peter A. "Encryption". In Pro SQL Server 2019 Administration, 371–408. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5089-1_11.
Texto completo da fonteMustafa, Osama, e Robert P. Lockard. "Encryption". In Oracle Database Application Security, 1–45. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5367-0_1.
Texto completo da fonteNatarajan, Jay, Rudi Bruchez, Scott Shaw e Michael Coles. "Encryption". In Pro T-SQL 2012 Programmer’s Guide, 179–203. Berkeley, CA: Apress, 2012. http://dx.doi.org/10.1007/978-1-4302-4597-1_7.
Texto completo da fonteSpendolini, Scott. "Encryption". In Expert Oracle Application Express Security, 247–63. Berkeley, CA: Apress, 2013. http://dx.doi.org/10.1007/978-1-4302-4732-6_14.
Texto completo da fonteCebollero, Miguel, Jay Natarajan e Michael Coles. "Encryption". In Pro T-SQL Programmer's Guide, 207–32. Berkeley, CA: Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-0145-9_8.
Texto completo da fonteCarter, Peter A. "Encryption". In Pro SQL Server Administration, 317–39. Berkeley, CA: Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-0710-9_10.
Texto completo da fonteAitchison, Alastair, e Adam Machanic. "Encryption". In Expert SQL Server 2008 Development, 121–58. Berkeley, CA: Apress, 2009. http://dx.doi.org/10.1007/978-1-4302-7212-0_6.
Texto completo da fonteBuchmann, Johannes A. "Encryption". In Introduction to Cryptography, 69–101. New York, NY: Springer US, 2001. http://dx.doi.org/10.1007/978-1-4684-0496-8_3.
Texto completo da fonteTrabalhos de conferências sobre o assunto "Encryption"
Gao, Haiying, e Chao Ma. "An Adaptively Secure NIPE Scheme based on DCR Assumption". In 9th International Conference on Artificial Intelligence and Applications (AIAPP 2022). Academy and Industry Research Collaboration Center (AIRCC), 2022. http://dx.doi.org/10.5121/csit.2022.120914.
Texto completo da fonteM. GHADI, Dua. "MODIFICATION OF ELGAMAL ELLIPTIC CURVE CRYPTOSYSTEM ALGORITHM". In VI.International Scientific Congress of Pure,Applied and Technological Sciences. Rimar Academy, 2022. http://dx.doi.org/10.47832/minarcongress6-8.
Texto completo da fontePiper, F. "Encryption". In European Conference on Security and Detection - ECOS97 Incorporating the One Day Symposium on Technology Used for Combatting Fraud. IEE, 1997. http://dx.doi.org/10.1049/cp:19970422.
Texto completo da fonteHashizume, Keiko, e Eduardo B. Fernandez. "Symmetric encryption and XML encryption patterns". In the 16th Conference. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1943226.1943243.
Texto completo da fonteCai, Xiantao, Weidong Li e Fazhi He. "Partial Encryption Based Secure Sharing of CAD Models for Cloud-Based Design". In ASME 2014 International Manufacturing Science and Engineering Conference collocated with the JSME 2014 International Conference on Materials and Processing and the 42nd North American Manufacturing Research Conference. American Society of Mechanical Engineers, 2014. http://dx.doi.org/10.1115/msec2014-4079.
Texto completo da fonteWang, Y. "A data encryption scheme combined symmetric encryption algorithm with asymmetric encryption algorithm". In 5th International Conference on Artificial Intelligence and Advanced Manufacturing (AIAM 2023). Institution of Engineering and Technology, 2023. http://dx.doi.org/10.1049/icp.2023.2981.
Texto completo da fontehuang, haomin, Jing Song, Zhijia Xu, Xiaoke Ding e Wei Deng. "Vehicle security encryption based on unlicensed encryption". In Other Applications. SPIE, 2018. http://dx.doi.org/10.1117/12.2284465.
Texto completo da fonteBellafqira, Reda, Gouenou Coatrieux, Dalel Bouslimi, Gwénolé Quellec e Michel Cozic. "Proxy Re-Encryption Based on Homomorphic Encryption". In ACSAC 2017: 2017 Annual Computer Security Applications Conference. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3134600.3134616.
Texto completo da fonteMalladar, Rohit, e Sanjeev Kunte. "Selective video encryption using Sattolo's encryption technique". In 2016 International Conference on Electrical, Electronics, Communication, Computer and Optimization Techniques (ICEECCOT). IEEE, 2016. http://dx.doi.org/10.1109/iceeccot.2016.7955228.
Texto completo da fonteS, Rohini, e Gini R. "Efficient Unpredictable Multi Authority Attribute based Encryption". In The International Conference on scientific innovations in Science, Technology, and Management. International Journal of Advanced Trends in Engineering and Management, 2023. http://dx.doi.org/10.59544/ukgh4577/ngcesi23p17.
Texto completo da fonteRelatórios de organizações sobre o assunto "Encryption"
Karri, Ramesh, Ozgur Sinanoglu e Jeyavihayan Rajendran. Logic Encryption. Fort Belvoir, VA: Defense Technical Information Center, fevereiro de 2014. http://dx.doi.org/10.21236/ada595228.
Texto completo da fonteRaeburn, K. Advanced Encryption Standard (AES) Encryption for Kerberos 5. RFC Editor, fevereiro de 2005. http://dx.doi.org/10.17487/rfc3962.
Texto completo da fonteHarkins, D., e W. Kumari, eds. Opportunistic Wireless Encryption. RFC Editor, março de 2017. http://dx.doi.org/10.17487/rfc8110.
Texto completo da fonteTs'o, T. Telnet Data Encryption Option. RFC Editor, setembro de 2000. http://dx.doi.org/10.17487/rfc2946.
Texto completo da fontePark, J., S. Lee, J. Kim e J. Lee. The SEED Encryption Algorithm. RFC Editor, fevereiro de 2005. http://dx.doi.org/10.17487/rfc4009.
Texto completo da fonteLee, H. J., S. J. Lee, J. H. Yoon, D. H. Cheon e J. I. Lee. The SEED Encryption Algorithm. RFC Editor, dezembro de 2005. http://dx.doi.org/10.17487/rfc4269.
Texto completo da fonteJohnson, Karen L. Semaphore Network Encryption Report. Fort Belvoir, VA: Defense Technical Information Center, março de 1994. http://dx.doi.org/10.21236/ada279294.
Texto completo da fonteCoward, John R. Computational Complexity and Encryption. Fort Belvoir, VA: Defense Technical Information Center, fevereiro de 1995. http://dx.doi.org/10.21236/ada291910.
Texto completo da fonteJones, M., e J. Hildebrand. JSON Web Encryption (JWE). RFC Editor, maio de 2015. http://dx.doi.org/10.17487/rfc7516.
Texto completo da fonteBarnes, R., K. Bhargavan, B. Lipp e C. Wood. Hybrid Public Key Encryption. RFC Editor, fevereiro de 2022. http://dx.doi.org/10.17487/rfc9180.
Texto completo da fonte