Статті в журналах з теми "Blowfish Privacy"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-46 статей у журналах для дослідження на тему "Blowfish Privacy".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Liu, Jiaxiang, Karl Knopf, Yiqing Tan, Bolin Ding, and Xi He. "Catch a blowfish alive." Proceedings of the VLDB Endowment 14, no. 12 (July 2021): 2859–62. http://dx.doi.org/10.14778/3476311.3476363.
Повний текст джерелаChicha, Elie, Bechara Al Bouna, Mohamed Nassar, Richard Chbeir, Ramzi A. Haraty, Mourad Oussalah, Djamal Benslimane, and Mansour Naser Alraja. "A User-Centric Mechanism for Sequentially Releasing Graph Datasets under Blowfish Privacy." ACM Transactions on Internet Technology 21, no. 1 (February 2021): 1–25. http://dx.doi.org/10.1145/3431501.
Повний текст джерелаEt. al., Pravin Soni,. "Performance Analysis of Cascaded Hybrid Symmetric Encryption Models." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (April 10, 2021): 1699–708. http://dx.doi.org/10.17762/turcomat.v12i2.1506.
Повний текст джерелаEzadeen, Shamil, and Auday H. Alwattar. "Survey of Blowfish Algorithm for Cloud." Technium: Romanian Journal of Applied Sciences and Technology 4, no. 6 (June 28, 2022): 18–28. http://dx.doi.org/10.47577/technium.v4i6.6791.
Повний текст джерелаEdwards, Tobias, Benjamin I. P. Rubinstein, Zuhe Zhang, and Sanming Zhou. "A Graph Symmetrization Bound on Channel Information Leakage Under Blowfish Privacy." IEEE Transactions on Information Theory 68, no. 1 (January 2022): 538–48. http://dx.doi.org/10.1109/tit.2021.3120371.
Повний текст джерелаDalave, Chetan Vijaykumar, Anushka Alok Lodh, and Tushar Vijaykumar Dalave. "Secure the File Storage on Cloud Computing Using Hybrid Cryptography Algorithm." International Journal for Research in Applied Science and Engineering Technology 10, no. 4 (April 30, 2022): 672–76. http://dx.doi.org/10.22214/ijraset.2022.41332.
Повний текст джерелаKumari, Nidhi, and Prof Vimmi Malhotra. "Secure Cloud Data Storage Using Hybrid Cryptography." International Journal for Research in Applied Science and Engineering Technology 10, no. 4 (April 30, 2022): 60–63. http://dx.doi.org/10.22214/ijraset.2022.41081.
Повний текст джерелаLiu, Changchang, Xi He, Thee Chanyaswad, Shiqiang Wang, and Prateek Mittal. "Investigating Statistical Privacy Frameworks from the Perspective of Hypothesis Testing." Proceedings on Privacy Enhancing Technologies 2019, no. 3 (July 1, 2019): 233–54. http://dx.doi.org/10.2478/popets-2019-0045.
Повний текст джерелаAmbika, M., Mangayarkarasi N., Raghuraman Gopalsamy, L. Sai Ramesh, and Kamalanathan Selvakumar. "Secure and Dynamic Multi-Keyword Ranked Search." International Journal of Operations Research and Information Systems 12, no. 3 (July 2021): 1–10. http://dx.doi.org/10.4018/ijoris.20210701.oa3.
Повний текст джерелаIftikhar, U., K. Asrar, M. Waqas, and S. A. Ali. "Evaluating the Performance Parameters of Cryptographic Algorithms for IOT-based Devices." Engineering, Technology & Applied Science Research 11, no. 6 (December 11, 2021): 7867–74. http://dx.doi.org/10.48084/etasr.4263.
Повний текст джерелаEt. al., Ch Chakradhara Rao,. "Enhanced Effective and Privacy Preserving Multi Keyword Search over Encrypted Data in Cloud Storage Using Blowfish Algorithm." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (April 11, 2021): 2845–53. http://dx.doi.org/10.17762/turcomat.v12i2.2316.
Повний текст джерелаSelvi, M., and B. Ramakrishnan. "Secured Message Broadcasting in VANET using Blowfish Algorithm with Oppositional Deer Hunting Optimization." International Journal of Computer Network and Information Security 13, no. 2 (April 8, 2021): 39–52. http://dx.doi.org/10.5815/ijcnis.2021.02.04.
Повний текст джерелаRaut, Kinjal. "A Comprehensive Review of Cryptographic Algorithms." International Journal for Research in Applied Science and Engineering Technology 9, no. 12 (December 31, 2021): 1750–56. http://dx.doi.org/10.22214/ijraset.2021.39581.
Повний текст джерелаS, Nithyadevi, and Dr Sasirekha V. "An Efficient Vehicle Privacy Preservation Scheme with Enhanced Blowfish Encryption Algorithm for Ensuring Security in Vehicular Ad-Hoc Network (VANET)." Journal of Advanced Research in Dynamical and Control Systems 12, no. 05-SPECIAL ISSUE (May 30, 2020): 406–13. http://dx.doi.org/10.5373/jardcs/v12sp5/20201774.
Повний текст джерелаRifa’i, Annas, and Lilis Cucu Sumartini. "IMPLEMENTASI KRIPTOGRAFI MENGGUNAKAN METODE BLOWFISH DAN BASE64 UNTUK MENGAMANKAN DATABASE INFORMASI AKADEMIK PADA KAMPUS AKADEMI TELEKOMUNIKASI BOGOR BERBASIS WEB-BASED." Jurnal E-Komtek (Elektro-Komputer-Teknik) 3, no. 2 (November 12, 2019): 87–96. http://dx.doi.org/10.37339/e-komtek.v3i2.133.
Повний текст джерелаGoyal, Mani, and Avinash Sharma. "A Framework for Assessing Security Strength of Cloud Computing Service." Journal of Computational and Theoretical Nanoscience 16, no. 10 (October 1, 2019): 4389–93. http://dx.doi.org/10.1166/jctn.2019.8530.
Повний текст джерелаRaja, S. P. "Multiscale transform-based secured joint efficient medical image compression-encryption using symmetric key cryptography and ebcot encoding technique." International Journal of Wavelets, Multiresolution and Information Processing 17, no. 05 (September 2019): 1950034. http://dx.doi.org/10.1142/s0219691319500346.
Повний текст джерелаSolanki, Madan, and Prof (Dr ). Vrinda Tokekar. "Design and Implementation of Strong Security Architecture for Amazon Web Service based on Cloud Applications." International Journal of Innovative Technology and Exploring Engineering 11, no. 12 (November 30, 2022): 17–22. http://dx.doi.org/10.35940/ijitee.l9324.11111222.
Повний текст джерелаLalita Kumar Parvataneni, Mohith, Eswara Sai Nath Adusumalli, and Rajeshbabu C. "Secure and Efficient Query Processing Using Randomized Encryption and De-duplication on the Cloud." International Journal of Engineering & Technology 7, no. 2.24 (April 25, 2018): 311. http://dx.doi.org/10.14419/ijet.v7i2.24.12071.
Повний текст джерелаNita, Stefania, Marius Mihailescu, and Valentin Pau. "Security and Cryptographic Challenges for Authentication Based on Biometrics Data." Cryptography 2, no. 4 (December 6, 2018): 39. http://dx.doi.org/10.3390/cryptography2040039.
Повний текст джерелаJabbar, Arshi, and Prof Umesh Lilhore. "Design and Implementation of Hybrid EC-RSA Security Algorithm Based on TPA for Cloud Storage." SMART MOVES JOURNAL IJOSCIENCE 3, no. 11 (November 30, 2017): 6. http://dx.doi.org/10.24113/ojsscience.v3i10.148.
Повний текст джерелаHema S and Dr.Kangaiammal A. "A Secure Method for Managing Data in Cloud Storage using Deduplication and Enhanced Fuzzy Based Intrusion Detection Framework." November 2020 6, no. 11 (November 30, 2020): 165–73. http://dx.doi.org/10.46501/ijmtst061131.
Повний текст джерелаIrfan, Pahrul, Rifqi Hammad, Andi Sofyan Anas, Fatimatuzzahra Fatimatuzzahra, and Nanang Samudra. "Application of the Blowfish Algorithm in securing patient data in the database." MATRIX : Jurnal Manajemen Teknologi dan Informatika 12, no. 2 (July 31, 2022): 102–8. http://dx.doi.org/10.31940/matrix.v12i2.102-108.
Повний текст джерелаHS, Christnatalis, and Amir Mahmud Husein. "Digital Signs Security System using AES-Blowfish-RSA Hybrid Cryptography Approach." SinkrOn 4, no. 1 (October 11, 2019): 185. http://dx.doi.org/10.33395/sinkron.v4i1.10244.
Повний текст джерелаAbu-Faraj, Mua’ad, Abeer Al-Hyari, and Ziad Alqadi. "A Complex Matrix Private Key to Enhance the Security Level of Image Cryptography." Symmetry 14, no. 4 (March 24, 2022): 664. http://dx.doi.org/10.3390/sym14040664.
Повний текст джерелаElangovan, Dinesh, and Ramesh Muthiya. "Design and Implementation of Crypt Analysis of Cloud Data Intrusion Management System." International Arab Journal of Information Technology 17, no. 6 (November 1, 2020): 895–905. http://dx.doi.org/10.34028/iajit/17/6/8.
Повний текст джерелаHtet, May, and Su Wai Phyo. "A Novel Text Steganographic Technique Using Specific Alphabets." Journal of Computer Science 2, no. 1 (July 16, 2016): 1–11. http://dx.doi.org/10.31357/jcs.v2i1.2721.
Повний текст джерелаChatterjee, Ayan, and Andreas Prinz. "Applying Spring Security Framework with KeyCloak-Based OAuth2 to Protect Microservice Architecture APIs: A Case Study." Sensors 22, no. 5 (February 22, 2022): 1703. http://dx.doi.org/10.3390/s22051703.
Повний текст джерелаSeada Abdu Wakene, Sisay Muleta Hababa, Gutema Seboka Daba, and K S Ananda Kumar. "Data Storage Security in Mobile Cloud Computing (MCC) using Improved Blowfish Algorithm." International Journal of Scientific Research in Computer Science, Engineering and Information Technology, November 15, 2021, 100–111. http://dx.doi.org/10.32628/cseit217620.
Повний текст джерела"Secure Ranked Multi-Keyword Search based on Modified Blowfish Algorithm and AVL Tree in Untrusted Cloud Environment." International Journal of Engineering and Advanced Technology 9, no. 1 (October 30, 2019): 6738–44. http://dx.doi.org/10.35940/ijeat.a2041.109119.
Повний текст джерелаAlabdulrazzaq, Haneen, and Mohammed N. Alenezi. "Performance Evaluation of Cryptographic Algorithms: DES, 3DES, Blowfish, Twofish, and Threefish." International Journal of Communication Networks and Information Security (IJCNIS) 14, no. 1 (April 15, 2022). http://dx.doi.org/10.17762/ijcnis.v14i1.5262.
Повний текст джерела"Enhancing Image Security by employing Blowfish Algorithm further embedding text and Stitching the RGB components of a Host Image." International Journal of Recent Technology and Engineering 8, no. 2S11 (November 2, 2019): 3801–8. http://dx.doi.org/10.35940/ijrte.b1499.0982s1119.
Повний текст джерела"Secure And Dynamic Multi Keyword Ranked Search." International Journal of Operations Research and Information Systems 12, no. 3 (July 2021): 0. http://dx.doi.org/10.4018/ijoris.20210701oa03.
Повний текст джерелаFahriah, Wildatunnisa, and Tulus Febrianto. "Aplikasi Enkripsi dan Dekripsi Short Message Service di Android Menggunakan Metode Blowfish." JISA(Jurnal Informatika dan Sains) 2, no. 1 (June 27, 2019). http://dx.doi.org/10.31326/jisa.v2i1.512.
Повний текст джерелаPermana, Angga Aditya. "APLIKASI PENYISIPAN TEKS PADA GAMBAR DENGAN ALGORITMA BLOWFISH DAN LEAST SIGNIFICANT BIT." JIKA (Jurnal Informatika) 1, no. 1 (June 17, 2017). http://dx.doi.org/10.31000/jika.v1i1.718.
Повний текст джерелаPermana, Angga Aditya. "APLIKASI PENYISIPAN TEKS PADA GAMBAR DENGAN ALGORITMA BLOWFISH DAN LEAST SIGNIFICANT BIT." JIKA (Jurnal Informatika) 1, no. 1 (May 8, 2018). http://dx.doi.org/10.31000/jika.v1i1.743.
Повний текст джерелаDinesh, E., and S. M. Ramesh. "Security Aware Data Transaction Using Optimized Blowfish Algorithm in Cloud Environment." Journal of Circuits, Systems and Computers, July 18, 2020, 2150004. http://dx.doi.org/10.1142/s0218126621500043.
Повний текст джерелаBarhoom, Tawfiq, and Mahmoud Abu Shawish. "Text File Privacy on the Cloud Based on Diagonal Fragmentation and Encryption." Journal of Engineering Research and Technology 8, no. 1 (March 3, 2021). http://dx.doi.org/10.33976/jert.8.1/2021/3.
Повний текст джерела"Security and Confidentiality of the Data using Block Level in Health Care System." International Journal of Recent Technology and Engineering 8, no. 2 (July 30, 2019): 2947–51. http://dx.doi.org/10.35940/ijrte.b2656.078219.
Повний текст джерелаMr. Shrikanta Jogar and Mr. Darshan S Handral. "Secure File Storage on Cloud Using Hybrid Cryptography." International Journal of Advanced Research in Science, Communication and Technology, July 23, 2022, 540–51. http://dx.doi.org/10.48175/ijarsct-5861.
Повний текст джерела"Security Enhancement in Cryptography for Mobile Device Outsourced in Cloud Computing." International Journal of Innovative Technology and Exploring Engineering 9, no. 8 (June 10, 2020): 971–75. http://dx.doi.org/10.35940/ijitee.h6780.069820.
Повний текст джерелаKaviya, K., K. K. Shanthini, and M. Sujithra. "Evolving Cryptographic Approach for Enhancing Security of Resource Constrained Mobile Device Outsourced Data in Cloud Computing." International Journal of Scientific Research in Computer Science, Engineering and Information Technology, January 5, 2019, 101–6. http://dx.doi.org/10.32628/cseit195111.
Повний текст джерелаAlenezi, Mohammed N., and Fawaz S. Al-Anzi. "A Study of Z-Transform Based Encryption Algorithm." International Journal of Communication Networks and Information Security (IJCNIS) 13, no. 2 (April 15, 2022). http://dx.doi.org/10.17762/ijcnis.v13i2.5052.
Повний текст джерела"Two Layer Image Encryption using Symmetric Key Algorithms." International Journal of Innovative Technology and Exploring Engineering 9, no. 7 (May 10, 2020): 1056–59. http://dx.doi.org/10.35940/ijitee.g5285.059720.
Повний текст джерела"Progressing Biometric Security Concern with Blowfish Algorithm." International Journal of Innovative Technology and Exploring Engineering 8, no. 9S2 (August 31, 2019): 166–71. http://dx.doi.org/10.35940/ijitee.i1032.0789s219.
Повний текст джерела"FCNN Model for Diagnosis and Analysis of Symmetric Key Cryptosystem." Iraqi Journal for Computer Science and Mathematics, November 2, 2022, 53–61. http://dx.doi.org/10.52866/ijcsm.2023.01.01.006.
Повний текст джерела