Добірка наукової літератури з теми "Encryption techniques"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Encryption techniques".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Encryption techniques"
Et. al., Jaichandran R,. "A Hybrid Encryption Model with Attribute Based Encryption and Advanced Encryption Standard Techniques." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (April 11, 2021): 334–36. http://dx.doi.org/10.17762/turcomat.v12i2.720.
Повний текст джерелаRamanathan, Thirumalaimuthu, Md Jakir Hossen, Md Shohel Sayeed, and Joseph Emerson Raja. "Survey on computational intelligence based image encryption techniques." Indonesian Journal of Electrical Engineering and Computer Science 19, no. 3 (September 1, 2020): 1428. http://dx.doi.org/10.11591/ijeecs.v19.i3.pp1428-1435.
Повний текст джерелаParenreng, Jumadi Mabe, Sahraeni Maulida Mustari, and Abdul Wahid. "E-mail Security System Using El-Gamal Hybrid Algorithm and AES (Advanced Encryption Standard) Algorithm." Internet of Things and Artificial Intelligence Journal 2, no. 1 (February 16, 2022): 1–9. http://dx.doi.org/10.31763/iota.v2i1.510.
Повний текст джерелаSharma, Ramandeep, Richa Sharma, and Harmanjit Singh. "Classical Encryption Techniques." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 3, no. 1 (August 1, 2012): 84–90. http://dx.doi.org/10.24297/ijct.v3i1b.2745.
Повний текст джерелаYeow, Sin-Qian, and Kok-Why Ng. "Neural Network Based Data Encryption: A Comparison Study among DES, AES, and HE Techniques." JOIV : International Journal on Informatics Visualization 7, no. 3-2 (November 30, 2023): 2086. http://dx.doi.org/10.30630/joiv.7.3-2.2336.
Повний текст джерелаLi, Bingcheng, Dingkang Li, and Mingyuan Zhu. "Application analysis of data encryption technology." Applied and Computational Engineering 50, no. 1 (March 25, 2024): 199–205. http://dx.doi.org/10.54254/2755-2721/50/20241502.
Повний текст джерелаThabit, Zainab Hasan, Sadiq A. Mehdi, and Bashar M. Nema. "Enhancing Color Image Security: Encryption with Dynamic Chaotic Three-Dimensional System and Robust Security Analysis." Al-Mustansiriyah Journal of Science 34, no. 4 (December 30, 2023): 87–95. http://dx.doi.org/10.23851/mjs.v34i4.1411.
Повний текст джерелаYang, Ming, Monica Trifas, Guillermo Francia III, and Lei Chen. "Cryptographic and Steganographic Approaches to Ensure Multimedia Information Security and Privacy." International Journal of Information Security and Privacy 3, no. 3 (July 2009): 37–54. http://dx.doi.org/10.4018/jisp.2009100703.
Повний текст джерелаAlslman, Yasmeen, Eman Alnagi, Ashraf Ahmad, Yousef AbuHour, Remah Younisse, and Qasem Abu Al-haija. "Hybrid Encryption Scheme for Medical Imaging Using AutoEncoder and Advanced Encryption Standard." Electronics 11, no. 23 (November 30, 2022): 3967. http://dx.doi.org/10.3390/electronics11233967.
Повний текст джерелаMohammed, Zahraa A., Hadeel Qasem Gheni, Zahraa Jabbar Hussein, and Ali Kadhum M. Al-Qurabat. "Advancing Cloud Image Security via AES Algorithm Enhancement Techniques." Engineering, Technology & Applied Science Research 14, no. 1 (February 8, 2024): 12694–701. http://dx.doi.org/10.48084/etasr.6601.
Повний текст джерелаДисертації з теми "Encryption techniques"
Wang, Yongsheng. "Advanced video encryption techniques." Thesis, Queen's University Belfast, 2013. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.602966.
Повний текст джерелаDutta, Saurabh. "Approach towards development of efficient encryption techniques." Thesis, University of North Bengal, 2004. http://hdl.handle.net/123456789/26.
Повний текст джерелаKasarabada, Yasaswy V. "Efficient Logic Encryption Techniques for Sequential Circuits." University of Cincinnati / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1613752483402656.
Повний текст джерелаTalhah, Saad. "Advanced Encryption Techniques using New Mersenne Number Transforms." Thesis, University of Leeds, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.515408.
Повний текст джерелаChen, Hang. "Optical Encryption Techniques for Color Image and Hyperspectral Data." Thesis, Université de Lorraine, 2017. http://www.theses.fr/2017LORR0374.
Повний текст джерелаOptical information security is one of the most important research directions in information science and technology, especially in the field of copyright protection, confidential information transmission/storage and military remote sensing. Since double random phase encoding technology (DRPE) was proposed, optical image encryption technology has become the main topic of optical information security and it has been developed and studied deeply. Optical encryption techniques offer the possibility of high-speed parallel processing of two dimension image data and hiding information in many different dimensions. In this context, much significant research and investigation on optical image encryption have been presented based on DRPE or further optical operation, such as digital holography, Fresnel transform, gyrator transform. Simultaneously, the encrypted image has been extended from single gray image to double image, color image and multi-image. However, the hyperspectral image, as a significant element in military and commercial remote sensing, has not been deeply researched in optical encryption area until now. This work extends the optical encryption technology from color image to hyperspectral image. For better comprehension of hyperspectral image encryption, this work begins with the introduction and analysis of the characteristics of hyperspectral cube. Subsequently, several kinds of encryption schemes for color image, including symmetric and asymmetric cryptosystem, are presented individually. Furthermore, the optical encryption algorithms for hyperspectral cube are designed for securing both the spatial and spectral information simultaneously. Some numerical simulations are given to validate the performance of the proposed encryption schemes. The corresponding attack experiment results demonstrate the capability and robustness of the approaches designed in this work. The research in this dissertation provides reference for the further practicality of hyperspectral image encryption
Jha, Pawan Kumar. "AN APPROACH TOWARDS DESIGN AND IMPLEMENTATION OF SYMMETRIC ENCRYPTION TECHNIQUES." Thesis, University of North Bengal, 2006. http://hdl.handle.net/123456789/11.
Повний текст джерелаWong, Hon Wah. "Image watermarking and data hiding techniques /." View Abstract or Full-Text, 2003. http://library.ust.hk/cgi/db/thesis.pl?ELEC%202003%20WONGH.
Повний текст джерелаIncludes bibliographical references (leaves 163-178). Also available in electronic version. Access restricted to campus users.
Brisbane, Gareth Charles Beattie. "On information hiding techniques for digital images." Access electronically, 2004. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20050221.122028/index.html.
Повний текст джерелаGuruswamy, Aarumugam Bhupathi Rajan. "Independent Domain of Symmetric Encryption using Least SignificantBit : Computer Vision, Steganography and Cryptography Techniques." Thesis, Högskolan Dalarna, Datateknik, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:du-10063.
Повний текст джерелаZhao, Weiliang, University of Western Sydney, of Science Technology and Environment College, and School of Computing and Information Technology. "Security techniques for electronic commerce applications." THESIS_CSTE_CIT_Zhao_W.xml, 2003. http://handle.uws.edu.au:8081/1959.7/127.
Повний текст джерелаMaster of Science (Hons)
Книги з теми "Encryption techniques"
Held, Gilbert. Top secret data encryption techniques. Carmel, Ind: Sams Pub., 1993.
Знайти повний текст джерелаLian, Shiguo. Multimedia content encryption: Techniques and applications. Boca Raton: Auerbach Publications, 2008.
Знайти повний текст джерелаBorivoje, Furht, and Kirovski Darko, eds. Multimedia encryption and authentication techniques and applications. Boca Raton, Fla: Auerbach Publications, 2006.
Знайти повний текст джерелаHeld, Gilbert. Learn encryption techniques with BASIC and C++. Plano, Tex: Wordware Pub., 1999.
Знайти повний текст джерелаGriffiths, James. Investigate, code and compare techniques used in implementing encryption technology. Oxford: Oxford Brookes University, 2003.
Знайти повний текст джерелаSwenson, Christopher. Modern cryptanalysis: Techniques for advanced code breaking. Indianapolis, IN: Wiley Pub., 2008.
Знайти повний текст джерелаS, Schmalz Mark, Society of Photo-optical Instrumentation Engineers., and Society for Industrial and Applied Mathematics., eds. Mathematics and applications of data/image coding, compression, and encryption III: 2 August 2000, San Diego, USA. Bellingham, Wash., USA: SPIE, 2000.
Знайти повний текст джерелаS, Schmalz Mark, and Society of Photo-optical Instrumentation Engineers., eds. Mathematics of data/image coding, compression, and encryption VII, with applications: 4-5 August, 2004, Denver, Colorado, USA. Bellingham, Wash: SPIE, 2004.
Знайти повний текст джерелаShih, Frank Y. Digital watermarking and steganography: Fundamentals and techniques. Boca Raton, Fl: Taylor & Francis, 2008.
Знайти повний текст джерелаWold, Geoffrey H. Computer crime: Techniques, prevention. Rolling Meadows, Ill: Bankers Pub. Co., 1989.
Знайти повний текст джерелаЧастини книг з теми "Encryption techniques"
Albrecht, Martin, and Carlos Cid. "Algebraic Techniques in Differential Cryptanalysis." In Fast Software Encryption, 193–208. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03317-9_12.
Повний текст джерелаGautam, Tanvi. "Identity—Based Encryption." In Emerging Security Algorithms and Techniques, edited by Aditya Thakkar and Nitish Pathak, 159–81. Boca Raton : Taylor & Francis, a CRC title, part of the Taylor &: Chapman and Hall/CRC, 2019. http://dx.doi.org/10.1201/9781351021708-10.
Повний текст джерелаGautam, Tanvi, Aditya Thakkar, and Nitish Pathak. "Attribute-Based Encryption." In Emerging Security Algorithms and Techniques, 183–95. Boca Raton : Taylor & Francis, a CRC title, part of the Taylor &: Chapman and Hall/CRC, 2019. http://dx.doi.org/10.1201/9781351021708-11.
Повний текст джерелаGouget, Aline, Hervé Sibert, Côme Berbain, Nicolas Courtois, Blandine Debraize, and Chris Mitchell. "Analysis of the Bit-Search Generator and Sequence Compression Techniques." In Fast Software Encryption, 196–214. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11502760_13.
Повний текст джерелаThanki, Rohit M. "Audio Watermarking with Encryption." In Advanced Techniques for Audio Watermarking, 59–81. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-24186-5_5.
Повний текст джерелаDinur, Itai, Orr Dunkelman, Nathan Keller, and Adi Shamir. "Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64." In Fast Software Encryption, 390–410. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-46706-0_20.
Повний текст джерелаLu, Rongxing. "Homomorphic Public Key Encryption Techniques." In Wireless Networks, 13–40. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-32899-7_2.
Повний текст джерелаRajendiran, M., B. Syed Ibrahim, R. Pratheesh, and C. Nelson Kennnedy Babu. "Multilanguage Based SMS Encryption Techniques." In Advances in Intelligent Systems and Computing, 455–60. New Delhi: Springer India, 2013. http://dx.doi.org/10.1007/978-81-322-0740-5_55.
Повний текст джерелаMishra, Prasanna Raghaw, Indivar Gupta, and Navneet Gaba. "Cryptanalysis of Multilanguage Encryption Techniques." In Mathematics and Computing 2013, 13–21. New Delhi: Springer India, 2014. http://dx.doi.org/10.1007/978-81-322-1952-1_2.
Повний текст джерелаChen, Huaifeng, and Xiaoyun Wang. "Improved Linear Hull Attack on Round-Reduced Simon with Dynamic Key-Guessing Techniques." In Fast Software Encryption, 428–49. Berlin, Heidelberg: Springer Berlin Heidelberg, 2016. http://dx.doi.org/10.1007/978-3-662-52993-5_22.
Повний текст джерелаТези доповідей конференцій з теми "Encryption techniques"
Liu Nan, Wang Huifen, and Fan Jing. "Time hopping encryption techniques." In IET 2nd International Conference on Wireless, Mobile and Multimedia Networks (ICWMMN 2008). IEE, 2008. http://dx.doi.org/10.1049/cp:20081040.
Повний текст джерелаMalladar, Rohit, and Sanjeev Kunte. "Selective video encryption using Sattolo's encryption technique." In 2016 International Conference on Electrical, Electronics, Communication, Computer and Optimization Techniques (ICEECCOT). IEEE, 2016. http://dx.doi.org/10.1109/iceeccot.2016.7955228.
Повний текст джерелаShafiq, Sobia, Sundas Hanif, Fasih Ur Rehman, Kamran Tariq, and Adeel Nawaz. "Video Encryption Techniques: A Review." In 2019 International Conference on Digitization (ICD). IEEE, 2019. http://dx.doi.org/10.1109/icd47981.2019.9105707.
Повний текст джерелаKoganti, Venkata SreeKrishna, Lavanya K. Galla, Nagarjuna Nuthalapati, and Anil Varma Kakarlapudi. "Authentication protocols using encryption techniques." In 2016 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT). IEEE, 2016. http://dx.doi.org/10.1109/iccicct.2016.7987921.
Повний текст джерелаShunmugan, S., and P. Arockia Jansi Rani. "Encryption-then-compression techniques: A survey." In 2016 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT). IEEE, 2016. http://dx.doi.org/10.1109/iccicct.2016.7988037.
Повний текст джерелаDivanshu, Hitu Singla, Vikash Sharma, Bharti Sharma, and Prateek Thakral. "A Quick Tour to Encryption Techniques." In 2018 2nd International Conference on Trends in Electronics and Informatics (ICOEI). IEEE, 2018. http://dx.doi.org/10.1109/icoei.2018.8553758.
Повний текст джерелаSingh, Kehar. "Optical encryption techniques for data security." In 19th Congress of the International Commission for Optics: Optics for the Quality of Life, edited by Giancarlo C. Righini and Anna Consortini. SPIE, 2003. http://dx.doi.org/10.1117/12.524636.
Повний текст джерелаOgiela, Marek R., and Marcin Oczko. "Comparison of Selected Homomorphic Encryption Techniques." In 2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA). IEEE, 2018. http://dx.doi.org/10.1109/aina.2018.00159.
Повний текст джерелаWeir, M. "6.1 Encryption Techniques for Test Data." In ettc2022 - European Test and Telemetry Conference. AMA Service GmbH, Von-Münchhausen-Str. 49, 31515 Wunstorf, Germany, 2022. http://dx.doi.org/10.5162/ettc2022/6.1.
Повний текст джерелаShyamala, N., and K. Anusudha. "Reversible Chaotic Encryption Techniques For Images." In 2017 Fourth International Conference on Signal Processing,Communication and Networking (ICSCN). IEEE, 2017. http://dx.doi.org/10.1109/icscn.2017.8085656.
Повний текст джерелаЗвіти організацій з теми "Encryption techniques"
Rannenberg, Kai, Sebastian Pape, Frédéric Tronnier, and Sascha Löbner. Study on the Technical Evaluation of De-Identification Procedures for Personal Data in the Automotive Sector. Universitätsbibliothek Johann Christian Senckenberg, October 2021. http://dx.doi.org/10.21248/gups.63413.
Повний текст джерела