Статті в журналах з теми "Asymmetric encryption methods"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Asymmetric encryption methods".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Luo, Guangchun, Ningduo Peng, Ke Qin, and Aiguo Chen. "A Layered Searchable Encryption Scheme with Functional Components Independent of Encryption Methods." Scientific World Journal 2014 (2014): 1–16. http://dx.doi.org/10.1155/2014/153791.
Повний текст джерелаAbdElminaam, DiaaSalama, Hatem M. Abdul Kader, Mohie M. Hadhoud, and Salah M. El-Sayed. "Developing and Evaluation of New Hybrid Encryption Algorithms." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 13, no. 1 (March 28, 2014): 4038–52. http://dx.doi.org/10.24297/ijct.v13i1.2926.
Повний текст джерелаYayla, Rıdvan, Hakan Üçgün, and Sefa Tunçer. "A Research on Encryption Methods and Account Security." Academic Perspective Procedia 3, no. 1 (October 25, 2020): 385–94. http://dx.doi.org/10.33793/acperpro.03.01.81.
Повний текст джерелаNagavalli, S., and G. Ramachandran. "A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryption Scheme." International Journal of Advances in Applied Sciences 7, no. 4 (December 1, 2018): 369. http://dx.doi.org/10.11591/ijaas.v7.i4.pp369-376.
Повний текст джерелаSa'adah, Nihayatus, I. Gede Puja Astawa, and Amang Sudarsono. "Trusted Data Transmission Using Data Scrambling Security Method with Asymmetric Key Algorithm for Synchronization." EMITTER International Journal of Engineering Technology 6, no. 2 (December 29, 2018): 217–35. http://dx.doi.org/10.24003/emitter.v6i2.267.
Повний текст джерелаHOOBI, Mays M. "SURVEY: EFFICIENT HYBRID ALGOR ITHMS OF CRYPTOGRAPHY." MINAR International Journal of Applied Sciences and Technology 2, no. 4 (December 1, 2020): 1–16. http://dx.doi.org/10.47832/2717-8234.4-2.1.
Повний текст джерелаManiyath, Shima Ramesh, and Thanikaiselvan V. "A novel efficient multiple encryption algorithm for real time images." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 2 (April 1, 2020): 1327. http://dx.doi.org/10.11591/ijece.v10i2.pp1327-1336.
Повний текст джерелаZhu, Maoran, and Xin Liu. "Study on Internet Finance Credit Information Sharing Based on Block Chain Technology." Asian Social Science 14, no. 2 (January 29, 2018): 81. http://dx.doi.org/10.5539/ass.v14n2p81.
Повний текст джерелаSafira, Maria Okta, and I. Komang Ari Mogi. "Design Of Hybrid Cryptography With Vigenere Cipher And RSA Algorithm On IOT Data Security." JELIKU (Jurnal Elektronik Ilmu Komputer Udayana) 8, no. 4 (February 4, 2020): 475. http://dx.doi.org/10.24843/jlk.2020.v08.i04.p14.
Повний текст джерелаKotukh, E. V., O. V. Severinov, A. V. Vlasov, L. S. Kozina, A. O. Tenytska, and E. O. Zarudna. "Methods of construction and properties of logariphmic signatures." Radiotekhnika, no. 205 (July 2, 2021): 94–99. http://dx.doi.org/10.30837/rt.2021.2.205.09.
Повний текст джерелаLaurentinus, Laurentinus, Harrizki Arie Pradana, Dwi Yuny Sylfania, and Fransiskus Panca Juniawan. "Performance comparison of RSA and AES to SMS messages compression using Huffman algorithm." Jurnal Teknologi dan Sistem Komputer 8, no. 3 (April 19, 2020): 171–77. http://dx.doi.org/10.14710/jtsiskom.2020.13468.
Повний текст джерелаKlimushyn, Petro, Tetiana Solianyk, Oleksandr Mozhaev, Vitalii Nosov, Tetiana Kolisnyk, and Vasily Yanov. "HARDWARE SUPPORT PROCEDURES FOR ASYMMETRIC AUTHENTICATION OF THE INTERNET OF THINGS." Innovative Technologies and Scientific Solutions for Industries, no. 4 (18) (December 10, 2021): 31–39. http://dx.doi.org/10.30837/itssi.2021.18.031.
Повний текст джерелаSingh, Hukum, and Mehak Khurana. "An Asymmetric Optical Cryptosystem of Double Image Encryption Based on Optical Vortex Phase Mask Using Gyrator Transform Domain." Recent Advances in Computer Science and Communications 13, no. 4 (October 19, 2020): 672–85. http://dx.doi.org/10.2174/1385272823666190429155557.
Повний текст джерелаHarba, E. S. I. "Secure Data Encryption Through a Combination of AES, RSA and HMAC." Engineering, Technology & Applied Science Research 7, no. 4 (August 9, 2017): 1781–85. http://dx.doi.org/10.48084/etasr.1272.
Повний текст джерелаKorolyov, V., M. Ogurtsov, and A. Khodzinsky. "Multilevel Identification Friend or Foe of Objects and Analysis of the Applicability of Post-Quantum Cryptographic Algorithms for Information Security." Cybernetics and Computer Technologies, no. 3 (October 27, 2020): 74–84. http://dx.doi.org/10.34229/2707-451x.20.3.7.
Повний текст джерелаRohan, Dewanto Harwin, and Nur Hayati. "Persamaan Lorenz untuk Keamanan Nomor Serial Sistem Operasi Window7." Jurnal Ilmiah FIFO 10, no. 2 (March 1, 2019): 1. http://dx.doi.org/10.22441/fifo.2018.v10i2.001.
Повний текст джерелаHongmei, Zhao. "A Cross-Border E-Commerce Approach Based on Blockchain Technology." Mobile Information Systems 2021 (July 15, 2021): 1–10. http://dx.doi.org/10.1155/2021/2006082.
Повний текст джерелаLi, Xin Hua. "Research of JMS Security Mechanism." Applied Mechanics and Materials 635-637 (September 2014): 1171–74. http://dx.doi.org/10.4028/www.scientific.net/amm.635-637.1171.
Повний текст джерелаBudati, Anil Kumar, Ganesh Snv, Kumar Cherukupalli, Anil Kumar P., and Venkata Krishna Moorthy T. "High speed data encryption technique with optimized memory based RSA algorithm for communications." Circuit World 47, no. 3 (June 22, 2021): 269–73. http://dx.doi.org/10.1108/cw-10-2020-0282.
Повний текст джерелаKulibaba, V. A. "Processes and methods for selecting system-wide parameters and analysis of resistance against third-party channel attacks for the key encapsulation mechanism DSTU 8961:2019." Radiotekhnika, no. 205 (July 2, 2021): 71–78. http://dx.doi.org/10.30837/rt.2021.2.205.06.
Повний текст джерелаSihombing, Grace Lamudur Arta. "HYBRID CHRIPTOGRAPHY STREAM CIPHER AND RSA ALGORITHM WITH DIGITAL SIGNATURE AS A KEY." InfoTekJar (Jurnal Nasional Informatika dan Teknologi Jaringan) 1, no. 2 (March 6, 2017): 75–83. http://dx.doi.org/10.30743/infotekjar.v1i2.66.
Повний текст джерелаVarma, Richa, Chris Melville, Claudio Pinello, and Tuhin Sahai. "Post Quantum Secure Command and Control of Mobile Agents Inserting Quantum-Resistant Encryption Schemes in the Secure Robot Operating System." International Journal of Semantic Computing 15, no. 03 (September 2021): 359–79. http://dx.doi.org/10.1142/s1793351x21400092.
Повний текст джерелаEt. al., Rojasree V. "Research Intuitions of Asymmetric Crypto System." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 3 (April 11, 2021): 5024–33. http://dx.doi.org/10.17762/turcomat.v12i3.2016.
Повний текст джерелаVamsi, Desam, and Pradeep Reddy CH. "Hybrid Image Encryption Using Elliptic Curve Cryptography, Hadamard Transform and Hill Cipher." Webology 19, no. 1 (January 20, 2022): 2357–78. http://dx.doi.org/10.14704/web/v19i1/web19160.
Повний текст джерелаAmir, Zainal, Syaifuddin Syaifuddin, and Diah Risqiwati. "IMPLEMENTASI ASYMMETRIC ENCRYPTION RSA PADA PORT KNOCKING UBUNTU SERVER MENGGUNAKAN KNOCKD DAN PYTHON." Jurnal Repositor 2, no. 6 (April 14, 2020): 787. http://dx.doi.org/10.22219/repositor.v2i6.270.
Повний текст джерелаWang, Ziheng, Heng Chen, and Weiguo Wu. "Client-Aware Negotiation for Secure and Efficient Data Transmission." Energies 13, no. 21 (November 4, 2020): 5777. http://dx.doi.org/10.3390/en13215777.
Повний текст джерелаSravani, B., Dr S. Pradeep, A. Damodar, and K. Kumar Swamy. "Compact Spiral Asymmetric encryption Distributed Ledger –Secured and authentication Mobile Payment System in Higher Institutions." Journal of University of Shanghai for Science and Technology 23, no. 08 (August 17, 2021): 567–82. http://dx.doi.org/10.51201/jusst/21/08427.
Повний текст джерелаYadav, Manisha, Karan Singh, Ajay Shekhar Pandey, Adesh Kumar, and Rajeev Kumar. "Smart Communication and Security by Key Distribution in Multicast Environment." Wireless Communications and Mobile Computing 2022 (March 19, 2022): 1–14. http://dx.doi.org/10.1155/2022/1011407.
Повний текст джерелаAlmaiah, Mohammed Amin, Ziad Dawahdeh, Omar Almomani, Adeeb Alsaaidah, Ahmad Al-Khasawneh, and Saleh Khawatreh. "A new hybrid text encryption approach over mobile ad hoc network." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 6 (December 1, 2020): 6461. http://dx.doi.org/10.11591/ijece.v10i6.pp6461-6471.
Повний текст джерелаFălămaş, Diana-Elena, Kinga Marton, and Alin Suciu. "Assessment of Two Privacy Preserving Authentication Methods Using Secure Multiparty Computation Based on Secret Sharing." Symmetry 13, no. 5 (May 18, 2021): 894. http://dx.doi.org/10.3390/sym13050894.
Повний текст джерелаFassa, M., G. Coatrieux, G. Trouessin, F. A. Allaert, and C. Quantin. "Combining Hashing and Enciphering Algorithms for Epidemiological Analysis of Gathered Data." Methods of Information in Medicine 47, no. 05 (2008): 454–58. http://dx.doi.org/10.3414/me0546.
Повний текст джерелаHumdullah, Salman, Siti Hajar Othman, Muhammad Najib Razali, Hazinah Kutty Mammi, and Rabia Javed. "An Improved Blockchain Technique for Secure Land Registration Data Records." International Journal of Innovative Computing 11, no. 2 (October 31, 2021): 89–94. http://dx.doi.org/10.11113/ijic.v11n2.291.
Повний текст джерелаMahalakshmi, M. Vignesh, and G. T. Shrivakshan. "An Efficient Cloud Computing Security in Healthcare Management System." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 8 (August 30, 2017): 185. http://dx.doi.org/10.23956/ijarcsse.v7i8.48.
Повний текст джерелаHaliuk, Serhii, Oleh Krulikovskyi, Dmytro Vovchuk, and Fernando Corinto. "Memristive Structure-Based Chaotic System for PRNG." Symmetry 14, no. 1 (January 4, 2022): 68. http://dx.doi.org/10.3390/sym14010068.
Повний текст джерелаRamu Kuchipudi, Ramu, Dr Ahmed Abdul Moiz Qyser, and Dr V V S S S Balaram. "Energy efficient Key Distribution for Wireless Sensor Networks." International Journal of Engineering & Technology 7, no. 4.6 (September 25, 2018): 45. http://dx.doi.org/10.14419/ijet.v7i4.6.20234.
Повний текст джерелаIbrahim, Anas, Alexander Chefranov, Nagham Hamad, Yousef-Awwad Daraghmi, Ahmad Al-Khasawneh, and Joel J. P. C. Rodrigues. "NTRU-Like Random Congruential Public-Key Cryptosystem for Wireless Sensor Networks." Sensors 20, no. 16 (August 17, 2020): 4632. http://dx.doi.org/10.3390/s20164632.
Повний текст джерелаSelvakumar, K., and S. Naveen Kumar. "Multivariate Quadratic Quasigroup Polynomial based Cryptosystem in Vanet." International Journal of Engineering & Technology 7, no. 4.10 (October 2, 2018): 832. http://dx.doi.org/10.14419/ijet.v7i4.10.26767.
Повний текст джерелаZhang, Yaming, and Chaozhuo Zhang. "Improving the Application of Blockchain Technology for Financial Security in Supply Chain Integrated Business Intelligence." Security and Communication Networks 2022 (May 9, 2022): 1–8. http://dx.doi.org/10.1155/2022/4980893.
Повний текст джерелаMustika, Laila. "Implementasi Algoritma AES Untuk Pengamanan Login Dan Data Customer Pada E-Commerce Berbasis Web." JURIKOM (Jurnal Riset Komputer) 7, no. 1 (February 15, 2020): 148. http://dx.doi.org/10.30865/jurikom.v7i1.1943.
Повний текст джерелаCynthia, Antony, and V. Saravanan. "Tango Binary Search Tree Based Asymmetric Cryptographic Sensor Node Authentication for Secured Communication in Wireless Sensor Networks." Sensor Letters 18, no. 1 (January 1, 2020): 55–63. http://dx.doi.org/10.1166/sl.2020.4189.
Повний текст джерелаAstafiev, A. V., and T. O. Shardin. "DATA EXCHANGE TECHNOLOGY BASED ON THE HANDSHAKE PROTOCOL FOR INDUSTRIAL AUTOMATION SYSTEM." Proceedings of the Southwest State University 22, no. 2 (April 28, 2018): 27–33. http://dx.doi.org/10.21869/2223-1560-2018-22-2-27-33.
Повний текст джерелаWang, Chuntao, Renxin Liang, Shancheng Zhao, Shan Bian, and Zhimao Lai. "Enhancing Performance of Lossy Compression on Encrypted Gray Images through Heuristic Optimization of Bitplane Allocation." Symmetry 13, no. 12 (December 6, 2021): 2338. http://dx.doi.org/10.3390/sym13122338.
Повний текст джерелаNavatejareddy, Ramireddy, Muthukuru Jayabhaskar, and Bachala Sathyanarayana. "Elliptical curve cryptography image encryption scheme with aid of optimization technique using gravitational search algorithm." Indonesian Journal of Electrical Engineering and Computer Science 25, no. 1 (January 1, 2022): 247. http://dx.doi.org/10.11591/ijeecs.v25.i1.pp247-255.
Повний текст джерелаDubovitskaya, Alevtina, Furqan Baig, Zhigang Xu, Rohit Shukla, Pratik Sushil Zambani, Arun Swaminathan, Md Majid Jahangir, et al. "ACTION-EHR: Patient-Centric Blockchain-Based Electronic Health Record Data Management for Cancer Care." Journal of Medical Internet Research 22, no. 8 (August 21, 2020): e13598. http://dx.doi.org/10.2196/13598.
Повний текст джерелаGuo, Junqi, Minghui Yang, and Boxin Wan. "A Practical Privacy-Preserving Publishing Mechanism Based on Personalized k-Anonymity and Temporal Differential Privacy for Wearable IoT Applications." Symmetry 13, no. 6 (June 9, 2021): 1043. http://dx.doi.org/10.3390/sym13061043.
Повний текст джерелаMatveichuk, T., V. Smychok, and S. Filimonov. "COMPARATIVE ANALYSIS OF TEXT DATA ASYMMETRIC ENCRYPTION METHODS." Electronics and Information Technologies 14 (2020). http://dx.doi.org/10.30970/eli.14.2.
Повний текст джерелаMoumen, Abdelkader, and Hocine Sissaoui. "Images Encryption Method using Steganographic LSB Method, AES and RSA algorithm." Nonlinear Engineering 6, no. 1 (January 1, 2017). http://dx.doi.org/10.1515/nleng-2016-0010.
Повний текст джерелаOrtiz, Santiago Marquez, Octavio Jose Salcedo Parra, and Miguel J. Espitia R. "Encryption through the use of fractals." INTERNATIONAL JOURNAL OF MATHEMATICAL ANALYSIS, 2017, 1029–40. http://dx.doi.org/10.12988/ijma.2017.710139.
Повний текст джерелаLi, Hui, and Ming Li. "Patent data access control and protection using blockchain technology." Scientific Reports 12, no. 1 (February 17, 2022). http://dx.doi.org/10.1038/s41598-022-05215-w.
Повний текст джерелаHodges, Philip, and Douglas Stebila. "Algorithm Substitution Attacks: State Reset Detection and Asymmetric Modifications." IACR Transactions on Symmetric Cryptology, June 11, 2021, 389–422. http://dx.doi.org/10.46586/tosc.v2021.i2.389-422.
Повний текст джерела