Добірка наукової літератури з теми "Probabilistic data encryption"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Probabilistic data encryption".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Probabilistic data encryption"
Mazumder, Rashed, Atsuko Miyaji, and Chunhua Su. "Probably Secure Keyed-Function Based Authenticated Encryption Schemes for Big Data." International Journal of Foundations of Computer Science 28, no. 06 (September 2017): 661–82. http://dx.doi.org/10.1142/s0129054117400123.
Повний текст джерелаLeung, K. C., S. L. Li, L. M. Cheng, and C. K. Chan. "A Symmetric Probabilistic Encryption Scheme Based On CHNN Without Data Expansion." Neural Processing Letters 24, no. 2 (September 20, 2006): 93–105. http://dx.doi.org/10.1007/s11063-006-9006-9.
Повний текст джерелаAruna, M. G., and K. G. Mohan. "Secured cloud data migration technique by competent probabilistic public key encryption." China Communications 17, no. 5 (May 2020): 168–90. http://dx.doi.org/10.23919/jcc.2020.05.014.
Повний текст джерелаKulshrestha, Vartika, Seema Verma, and C. Rama Krishna. "Hybrid probabilistic triple encryption approach for data security in cloud computing." International Journal of Advanced Intelligence Paradigms 21, no. 1/2 (2022): 158. http://dx.doi.org/10.1504/ijaip.2022.121035.
Повний текст джерелаZhu, Li Juan. "A Network Identity Authentication Protocol Based on Fingerprint and Probabilistic Encryption of RSA." Applied Mechanics and Materials 241-244 (December 2012): 2471–74. http://dx.doi.org/10.4028/www.scientific.net/amm.241-244.2471.
Повний текст джерелаKulshrestha, Vartika, Seema Verma, and C. Rama Krishna. "Hybrid Probabilistic Triple Encryption (HPRRA) Approach for Data Security in Cloud Computing." International Journal of Advanced Intelligence Paradigms 1, no. 1 (2021): 1. http://dx.doi.org/10.1504/ijaip.2021.10036005.
Повний текст джерелаLuna, Jose Marcio, Chaouki T. Abdallah, and Gregory L. Heileman. "Probabilistic Optimization of Resource Distribution and Encryption for Data Storage in the Cloud." IEEE Transactions on Cloud Computing 6, no. 2 (April 1, 2018): 428–39. http://dx.doi.org/10.1109/tcc.2016.2543728.
Повний текст джерелаZhang, Jing-Wen, Xiu-Bo Chen, Gang Xu, and Yi-Xian Yang. "Universal quantum circuit evaluation on encrypted data using probabilistic quantum homomorphic encryption scheme*." Chinese Physics B 30, no. 7 (July 1, 2021): 070309. http://dx.doi.org/10.1088/1674-1056/ac003b.
Повний текст джерелаGandhi, Mehak, and Kiranbir Kaur. "Enhancing Secure and Efficient Online Data Storage over Cloud Using Homomorphic with Probabilistic Encryption." International Journal of Computer Sciences and Engineering 6, no. 3 (March 30, 2018): 263–68. http://dx.doi.org/10.26438/ijcse/v6i3.263268.
Повний текст джерелаEt.al, Quazi Warisha Ahmed. "Energetic Data Security Management Scheme using Hybrid Encryption Algorithm over Cloud Environment." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (April 10, 2021): 201–8. http://dx.doi.org/10.17762/turcomat.v12i6.1289.
Повний текст джерелаДисертації з теми "Probabilistic data encryption"
Lincoln, Laura Beth. "Symmetric private information retrieval via additive homomorphic probabilistic encryption /." Online version of thesis, 2006. https://ritdml.rit.edu/dspace/handle/1850/2792.
Повний текст джерелаБейнер, Петр Сергеевич. "Информационно-измерительная система мониторинга температурного режима гидротехнических сооружений АЭС". Thesis, Национальный аэрокосмический университет им. Н. Е. Жуковского "Харьковский авиационный институт", 2016. http://repository.kpi.kharkov.ua/handle/KhPI-Press/24781.
Повний текст джерелаThesis for scientific degree candidate of technical sciences in the specialty 05.13.05 – computer systems and components. – National Technical University "Kharkov Polytechnic Institute", Kharkov 2016. Dissertation is devoted to solving scientific and applied problems that concern the optimization of the NPP power system functioning. It is achieved by increasing monitoring accuracy of hydrothermal parameters at the hydrotechnical facilities taking into account hydrometeorological factors and the objective prediction of the circulating water temperature by means of the developed information-measurement system. The information-measurement system of the NPP hydrometeorological parameters was developed, with enhanced system of measurement, transfer, collection, backup, and analysis of parameters affecting the circulating water temperature at the NPP hydrotechnical facilities. Techniques to create energy-efficient structure of the wireless sensor networks were suggested, providing the remote measurement of the physical values extended over a large area of the NPP. The method of transferring hydrometeorological parameters within the information-measurement system was furthered, the probabilistic data encryption being used in the communication channels. It resulted in raising the security level of the measurement data against the unauthorized access and increasing the interference immunity.
Бейнер, Петро Сергійович. "Інформаційно-вимірювальна система моніторингу температурного режиму гідротехнічних споруд АЕС". Thesis, НТУ "ХПІ", 2016. http://repository.kpi.kharkov.ua/handle/KhPI-Press/24773.
Повний текст джерелаThesis for scientific degree candidate of technical sciences in the specialty 05.13.05 – computer systems and components. – National Technical University "Kharkov Polytechnic Institute", Kharkov 2016. Dissertation is devoted to solving scientific and applied problems that concern the optimization of the NPP power system functioning. It is achieved by increasing monitoring accuracy of hydrothermal parameters at the hydrotechnical facilities taking into account hydrometeorological factors and the objective prediction of the circulating water temperature by means of the developed information-measurement system. The information-measurement system of the NPP hydrometeorological parameters was developed, with enhanced system of measurement, transfer, collection, backup, and analysis of parameters affecting the circulating water temperature at the NPP hydrotechnical facilities. Techniques to create energy-efficient structure of the wireless sensor networks were suggested, providing the remote measurement of the physical values extended over a large area of the NPP. The method of transferring hydrometeorological parameters within the information-measurement system was furthered, the probabilistic data encryption being used in the communication channels. It resulted in raising the security level of the measurement data against the unauthorized access and increasing the interference immunity.
Книги з теми "Probabilistic data encryption"
Goldreich, Oded. Modern Cryptography, Probabilistic Proofs and Pseudorandomness. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999.
Знайти повний текст джерелаЧастини книг з теми "Probabilistic data encryption"
Adi Narayana Reddy, K., V. Madhu Viswanatham, and B. Vishnu Vardhan. "An Enhanced Probabilistic Encryption Algorithm for Secured Data Transmission." In Communications in Computer and Information Science, 284–90. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29219-4_33.
Повний текст джерелаKaduvu, Haripriya, V. Lavanya, and M. Saravanan. "Probabilistic Optimization of Incorporating Security Ciphers and Encryption of Data Storage in Cloud." In Artificial Intelligence Techniques for Advanced Computing Applications, 345–55. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5329-5_33.
Повний текст джерела"Encryption Schemes for Anonymous Systems." In Anonymous Security Systems and Applications, 26–45. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-1649-3.ch004.
Повний текст джерелаKrishna, Addepalli V. N., and Balamurugan M. "Security Mechanisms in Cloud Computing-Based Big Data." In Advances in Wireless Technologies and Telecommunication, 165–95. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7335-7.ch009.
Повний текст джерелаKrishna, Addepalli V. N., and Balamurugan M. "Security Mechanisms in Cloud Computing-Based Big Data." In Research Anthology on Artificial Intelligence Applications in Security, 694–724. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7705-9.ch032.
Повний текст джерелаKrishna, Addepalli V. N., and Balamurugan M. "Security Mechanisms in Cloud Computing-Based Big Data." In Research Anthology on Blockchain Technology in Business, Healthcare, Education, and Government, 897–926. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-5351-0.ch052.
Повний текст джерелаKrishna, Addepalli V. N., and Balamurugan M. "Security Mechanisms in Cloud Computing-Based Big Data." In Research Anthology on Artificial Intelligence Applications in Security, 694–724. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7705-9.ch032.
Повний текст джерелаN., Jayapandian. "Industry 4.0 Privacy and Security Protocol Issues in Internet of Things." In IoT Architectures, Models, and Platforms for Smart City Applications, 193–217. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-1253-1.ch010.
Повний текст джерелаN., Jayapandian. "Industry 4.0 Privacy and Security Protocol Issues in Internet of Things." In Research Anthology on Cross-Industry Challenges of Industry 4.0, 1853–76. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-8548-1.ch094.
Повний текст джерелаKrishna, A. V. N. "A Randomized Cloud Library Security Environment." In Cloud Security, 1087–107. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8176-5.ch056.
Повний текст джерелаТези доповідей конференцій з теми "Probabilistic data encryption"
Singh, Binay Kumar, Abusha Tsegaye, and Jagat Singh. "Probabilistic data encryption using elliptic curve cryptography and Arnold transformation." In 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC). IEEE, 2017. http://dx.doi.org/10.1109/i-smac.2017.8058259.
Повний текст джерелаSamanthula, Bharath K., Wei Jiang, and Sanjay Madria. "A Probabilistic Encryption Based MIN/MAX Computation in Wireless Sensor Networks." In 2013 14th IEEE International Conference on Mobile Data Management (MDM). IEEE, 2013. http://dx.doi.org/10.1109/mdm.2013.18.
Повний текст джерелаYeh, Jyh-Haw. "A Probabilistic Homomorphic Encryption Algorithm over Integers - Protecting Data Privacy in Clouds." In 2015 IEEE 12th Intl. Conf. on Ubiquitous Intelligence and Computing, 2015 IEEE 12th Intl. Conf. on Autonomic and Trusted Computing and 2015 IEEE 15th Intl. Conf. on Scalable Computing and Communications and its Associated Workshops (UIC-ATC-ScalCom). IEEE, 2015. http://dx.doi.org/10.1109/uic-atc-scalcom-cbdcom-iop.2015.130.
Повний текст джерела