Статті в журналах з теми "Encryption techniques"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Encryption techniques".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Et. al., Jaichandran R,. "A Hybrid Encryption Model with Attribute Based Encryption and Advanced Encryption Standard Techniques." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (April 11, 2021): 334–36. http://dx.doi.org/10.17762/turcomat.v12i2.720.
Повний текст джерелаRamanathan, Thirumalaimuthu, Md Jakir Hossen, Md Shohel Sayeed, and Joseph Emerson Raja. "Survey on computational intelligence based image encryption techniques." Indonesian Journal of Electrical Engineering and Computer Science 19, no. 3 (September 1, 2020): 1428. http://dx.doi.org/10.11591/ijeecs.v19.i3.pp1428-1435.
Повний текст джерелаParenreng, Jumadi Mabe, Sahraeni Maulida Mustari, and Abdul Wahid. "E-mail Security System Using El-Gamal Hybrid Algorithm and AES (Advanced Encryption Standard) Algorithm." Internet of Things and Artificial Intelligence Journal 2, no. 1 (February 16, 2022): 1–9. http://dx.doi.org/10.31763/iota.v2i1.510.
Повний текст джерелаSharma, Ramandeep, Richa Sharma, and Harmanjit Singh. "Classical Encryption Techniques." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 3, no. 1 (August 1, 2012): 84–90. http://dx.doi.org/10.24297/ijct.v3i1b.2745.
Повний текст джерелаYeow, Sin-Qian, and Kok-Why Ng. "Neural Network Based Data Encryption: A Comparison Study among DES, AES, and HE Techniques." JOIV : International Journal on Informatics Visualization 7, no. 3-2 (November 30, 2023): 2086. http://dx.doi.org/10.30630/joiv.7.3-2.2336.
Повний текст джерелаLi, Bingcheng, Dingkang Li, and Mingyuan Zhu. "Application analysis of data encryption technology." Applied and Computational Engineering 50, no. 1 (March 25, 2024): 199–205. http://dx.doi.org/10.54254/2755-2721/50/20241502.
Повний текст джерелаThabit, Zainab Hasan, Sadiq A. Mehdi, and Bashar M. Nema. "Enhancing Color Image Security: Encryption with Dynamic Chaotic Three-Dimensional System and Robust Security Analysis." Al-Mustansiriyah Journal of Science 34, no. 4 (December 30, 2023): 87–95. http://dx.doi.org/10.23851/mjs.v34i4.1411.
Повний текст джерелаYang, Ming, Monica Trifas, Guillermo Francia III, and Lei Chen. "Cryptographic and Steganographic Approaches to Ensure Multimedia Information Security and Privacy." International Journal of Information Security and Privacy 3, no. 3 (July 2009): 37–54. http://dx.doi.org/10.4018/jisp.2009100703.
Повний текст джерелаAlslman, Yasmeen, Eman Alnagi, Ashraf Ahmad, Yousef AbuHour, Remah Younisse, and Qasem Abu Al-haija. "Hybrid Encryption Scheme for Medical Imaging Using AutoEncoder and Advanced Encryption Standard." Electronics 11, no. 23 (November 30, 2022): 3967. http://dx.doi.org/10.3390/electronics11233967.
Повний текст джерелаMohammed, Zahraa A., Hadeel Qasem Gheni, Zahraa Jabbar Hussein, and Ali Kadhum M. Al-Qurabat. "Advancing Cloud Image Security via AES Algorithm Enhancement Techniques." Engineering, Technology & Applied Science Research 14, no. 1 (February 8, 2024): 12694–701. http://dx.doi.org/10.48084/etasr.6601.
Повний текст джерелаZhu, Bingxin, Puwen Wei, and Mingqiang Wang. "Adaptive Security of Broadcast Encryption, Revisited." Security and Communication Networks 2017 (2017): 1–16. http://dx.doi.org/10.1155/2017/1404279.
Повний текст джерелаWedad Abdul Khuder Naser, Amal Abbas Kadhim, and Safana Hyder Abbas. "Subject review: Image encryption techniques." Global Journal of Engineering and Technology Advances 15, no. 3 (June 30, 2023): 029–31. http://dx.doi.org/10.30574/gjeta.2023.15.3.0098.
Повний текст джерелаEl-Yahyaoui, Ahmed, and Mohamed Daifr Ech-Cherif El Kettani. "About Fully Homomorphic Encryption Improvement Techniques." International Journal of Embedded and Real-Time Communication Systems 10, no. 3 (July 2019): 1–20. http://dx.doi.org/10.4018/ijertcs.2019070101.
Повний текст джерелаPushpendra, Tiwari. "A study and comparison of the various cryptography technique standards within fifteen factors." i-manager's Journal on Digital Forensics & Cyber Security 1, no. 1 (2023): 21. http://dx.doi.org/10.26634/jdf.1.1.19134.
Повний текст джерелаJoshi, Bineet, Bansidhar Joshi, Anupama Mishra, Varsha Arya, Avadhesh Kumar Gupta, and Dragan Peraković. "A Comparative Study of Privacy-Preserving Homomorphic Encryption Techniques in Cloud Computing." International Journal of Cloud Applications and Computing 12, no. 1 (January 1, 2022): 1–11. http://dx.doi.org/10.4018/ijcac.309936.
Повний текст джерелаKumar, Brijesh, and Amrita Saraswat. "Security on Cloud using High Level Encryption Techniques." International Journal of Trend in Scientific Research and Development Volume-1, Issue-6 (October 31, 2017): 915–18. http://dx.doi.org/10.31142/ijtsrd4712.
Повний текст джерелаKaur, Mandeep, Surender Singh, and Manjit Kaur. "Computational Image Encryption Techniques: A Comprehensive Review." Mathematical Problems in Engineering 2021 (July 19, 2021): 1–17. http://dx.doi.org/10.1155/2021/5012496.
Повний текст джерелаMahna, Shivanku, and Sravan Ch. "Data Encryption Techniques for USB." International Journal of Computer Applications 104, no. 7 (October 18, 2014): 14–17. http://dx.doi.org/10.5120/18213-9162.
Повний текст джерелаSIROMONEY, RANI, K. G. SUBRAMANIAN, and P. J. ABISHA. "ENCRYPTION-DECRYPTION TECHNIQUES FOR PICTURES." International Journal of Pattern Recognition and Artificial Intelligence 03, no. 03n04 (December 1989): 497–503. http://dx.doi.org/10.1142/s0218001489000371.
Повний текст джерелаVasim Ahamad, Mohd, Misbah Urrahman Siddiqui, Maria Masroor, and Urooj Fatima. "An Improved Playfair Encryption Technique Using Fibonacci Series Generated Secret Key." International Journal of Engineering & Technology 7, no. 4.5 (September 22, 2018): 347. http://dx.doi.org/10.14419/ijet.v7i4.5.20104.
Повний текст джерелаRanjan, Kumar H. S., Safeeriya S. P. Fathimath, Ganesh Aithal, and Surendra Shetty. "A Survey on Key(s) and Keyless Image Encryption Techniques." Cybernetics and Information Technologies 17, no. 4 (November 27, 2017): 134–64. http://dx.doi.org/10.1515/cait-2017-0046.
Повний текст джерелаDr.R.Premkumar., Dr.C.Priya., S.Vengatesh Kumar.,, Dr M. Vidhyalakshmi &. Dr S. Saranya;. "Investigation on Image Encryption Using Chaos Based Techniques." International Journal for Modern Trends in Science and Technology 7, no. 05 (May 27, 2021): 147–53. http://dx.doi.org/10.46501/ijmtst0705025.
Повний текст джерелаParthasarathy, Rajamohan, Seow Soon Loong, and Preethy Ayyappan. "An Efficient Encryption Implementation Using AES Algorithm Techniques." Journal of Engineering & Technological Advances 3, no. 1 (2018): 61–70. http://dx.doi.org/10.35934/segi.v3i1.61.
Повний текст джерелаJameel, Enas Ali, and Sameera Abbas Fadhel. "Digital Image Encryption Techniques: Article Review." Technium: Romanian Journal of Applied Sciences and Technology 4, no. 2 (February 27, 2022): 24–35. http://dx.doi.org/10.47577/technium.v4i2.6026.
Повний текст джерелаSimkin, Mark G. "Using Spreadsheets to Teach Data Encryption Techniques." AIS Educator Journal 1, no. 1 (December 1, 2006): 27–37. http://dx.doi.org/10.3194/aise.2006.1.1.27.
Повний текст джерелаM, Sreekala, and Varghese Paul. "A Novel Hybrid Encryption Method for Multimedia Encryption Using Elliptic Curve Cryptography and TDMRC." International Journal of Emerging Research in Management and Technology 6, no. 7 (June 29, 2018): 1. http://dx.doi.org/10.23956/ijermt.v6i7.178.
Повний текст джерелаAl-Fayoumi, Mustafa A., Ammar Odeh, Ismail Keshta, and Ashraf Ahmad. "Techniques of medical image encryption taxonomy." Bulletin of Electrical Engineering and Informatics 11, no. 4 (August 1, 2022): 1990–97. http://dx.doi.org/10.11591/eei.v11i4.3850.
Повний текст джерелаPrashant, MD Sohail Haque, Amrinder Kaur, and Pankaj Yadav. "Comparative Analysis of AES and RSA with Other Encryption Techniques for Secure Communication." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, no. 2 (April 19, 2024): 565–74. http://dx.doi.org/10.32628/cseit2410263.
Повний текст джерелаAbu Zitar, Raed, and Muhammed J. Al-Muhammed. "Hybrid encryption technique: Integrating the neural network with distortion techniques." PLOS ONE 17, no. 9 (September 28, 2022): e0274947. http://dx.doi.org/10.1371/journal.pone.0274947.
Повний текст джерелаGosavi, Mr Abhijeet, Mr Sakib Shaikh, Mr Adnan Sayyed, Mr Somesh Sapa, Mr Ayan Shaikh, and Prof A. A. Pund. "Enabling Encrypted Cloud Emails with Data Encryption using Advanced Encryption Techniques." International Journal for Research in Applied Science and Engineering Technology 11, no. 6 (June 30, 2023): 864–69. http://dx.doi.org/10.22214/ijraset.2023.53709.
Повний текст джерелаGeetha, S., P. Punithavathi, A. Magnus Infanteena, and S. Siva Sivatha Sindhu. "A Literature Review on Image Encryption Techniques." International Journal of Information Security and Privacy 12, no. 3 (July 2018): 42–83. http://dx.doi.org/10.4018/ijisp.2018070104.
Повний текст джерелаMark Espalmado, John, and Edwin Arboleda. "DARE Algorithm: A New Security Protocol by Integration of Different Cryptographic Techniques." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 2 (April 1, 2017): 1032. http://dx.doi.org/10.11591/ijece.v7i2.pp1032-1041.
Повний текст джерелаChowdhary, Chiranji Lal, Pushpam Virenbhai Patel, Krupal Jaysukhbhai Kathrotia, Muhammad Attique, Kumaresan Perumal, and Muhammad Fazal Ijaz. "Analytical Study of Hybrid Techniques for Image Encryption and Decryption." Sensors 20, no. 18 (September 10, 2020): 5162. http://dx.doi.org/10.3390/s20185162.
Повний текст джерелаSridhar, B. "Performance Evaluation of Different Encryption Techniques." Research Journal of Engineering and Technology 9, no. 3 (2018): 227. http://dx.doi.org/10.5958/2321-581x.2018.00031.4.
Повний текст джерелаDhiman, Reema. "IMAGE ENCRYPTION TECHNIQUES: A LITERATURE REVIEW." International Journal of Advanced Research in Computer Science 8, no. 7 (August 20, 2017): 239–44. http://dx.doi.org/10.26483/ijarcs.v8i7.4209.
Повний текст джерелаSoofi, Aized Amin, M. Irfan Khan, and Fazal-e. Amin. "Encryption Techniques for Cloud Data Confidentiality." International Journal of Grid and Distributed Computing 7, no. 4 (August 31, 2014): 11–20. http://dx.doi.org/10.14257/ijgdc.2014.7.4.02.
Повний текст джерелаM. Abdullah, Rozin, and Araz Rajab Abrahim. "Review of Image Encryption using Different Techniques." Academic Journal of Nawroz University 11, no. 3 (June 30, 2022): 170–77. http://dx.doi.org/10.25007/ajnu.v11n3a1301.
Повний текст джерелаViresh, Kasheenath Babaleshwar, Karade Sinchana, N. Sakshi, and Naidu Anush. "Audio encryption and decryption using AES algorithm technique." i-manager’s Journal on Electronics Engineering 14, no. 2 (2024): 8. http://dx.doi.org/10.26634/jele.14.2.20486.
Повний текст джерелаAzhari, Rama, and Agita Nisa Salsabila. "Analyzing the Impact of Quantum Computing on Current Encryption Techniques." IAIC Transactions on Sustainable Digital Innovation (ITSDI) 5, no. 2 (February 22, 2024): 148–57. http://dx.doi.org/10.34306/itsdi.v5i2.662.
Повний текст джерелаGaurav Agarwal, Mohammed Shakeel, Akash Sanghi, YDS Arya,. "A Novel Security Model for Password Encryption Using Aadhaar and Amicable Number." Tuijin Jishu/Journal of Propulsion Technology 44, no. 4 (October 16, 2023): 1096–107. http://dx.doi.org/10.52783/tjjpt.v44.i4.981.
Повний текст джерелаDr. Gaurav Aggarwal, Mr. Hirdesh Sharma. "Comparative Analysis of Multi-Level Algorithm with Different Encryption and Decryption Security Algorithms." Tuijin Jishu/Journal of Propulsion Technology 44, no. 3 (October 5, 2023): 1640–48. http://dx.doi.org/10.52783/tjjpt.v44.i3.555.
Повний текст джерелаWadho, Shuaib Ahmed, Areej Fatemah Meghji, Aun Yichiet, Roshan Kumar, and Farhan Bashir Shaikh. "Encryption Techniques and Algorithms to Combat Cybersecurity Attacks: A Review." VAWKUM Transactions on Computer Sciences 11, no. 1 (June 30, 2023): 295–305. http://dx.doi.org/10.21015/vtcs.v11i1.1521.
Повний текст джерелаIrwanto, Dola. "File Encryption and Decryption Using Algorithm Aes-128 Bit Based Website." MALCOM: Indonesian Journal of Machine Learning and Computer Science 4, no. 2 (April 1, 2024): 670–77. http://dx.doi.org/10.57152/malcom.v4i2.1305.
Повний текст джерелаKannan, Rajesh, and Dr R. Mala. "Analysis of Encryption Techniques to Enhance Secure Data Transmission." International Journal of Engineering and Computer Science 7, no. 09 (September 9, 2018): 24311–18. http://dx.doi.org/10.18535/ijecs/v7i9.04.
Повний текст джерелаGarg, Monika, Karanvir Kaur, and Simerpreet Kaur. "Using 3GPP- A Secure IDS for MANETs." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 4, no. 2 (October 30, 2005): 518–21. http://dx.doi.org/10.24297/ijct.v4i2b2.3312.
Повний текст джерелаIbrahim, Dina, Kareem Ahmed, Mohamed Abdallah, and AbdElmgeid A. Ali. "A New Chaotic-Based RGB Image Encryption Technique Using a Nonlinear Rotational 16 × 16 DNA Playfair Matrix." Cryptography 6, no. 2 (June 8, 2022): 28. http://dx.doi.org/10.3390/cryptography6020028.
Повний текст джерелаShah, Jalpa, and JS Dhobi. "REVIEW OF IMAGE ENCRYPTION AND DECRYPTION TECHNIQUES FOR 2D IMAGES." International Journal of Engineering Technologies and Management Research 5, no. 1 (February 7, 2020): 81–84. http://dx.doi.org/10.29121/ijetmr.v5.i1.2018.49.
Повний текст джерелаRabie, A., Kh El Shafie, A. Hammuoda, and M. Rohiem. "Data ecryption based on multi-order FrFT, and FPGA implementation of DES algorith." International Journal of Reconfigurable and Embedded Systems (IJRES) 9, no. 2 (July 1, 2020): 141. http://dx.doi.org/10.11591/ijres.v9.i2.pp141-152.
Повний текст джерелаEt. al., K. S. Mohanasathiya,. "Security And Privacy Using Two Fold Encryption Protocol Techniques In Edge Computing." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 10 (April 28, 2021): 6025–34. http://dx.doi.org/10.17762/turcomat.v12i10.5427.
Повний текст джерелаFadhel, Sabah, Mohd Shafry, and Omar Farook. "Chaos Image Encryption Methods: A Survey Study." Bulletin of Electrical Engineering and Informatics 6, no. 1 (March 1, 2017): 99–104. http://dx.doi.org/10.11591/eei.v6i1.599.
Повний текст джерела