Статті в журналах з теми "Probabilistic data encryption"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Probabilistic data encryption".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
N., V. V. Satyanarayana, M. S. V. Ravi Kumar J., Babu Reddy M., Leelavathi N., and Sujatha B. "A Symmetric Searchable Encryption Identification of Data on Probabilistic Trapdoors." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 3 (2020): 3880–83. https://doi.org/10.35940/ijeat.C6389.029320.
Повний текст джерелаMazumder, Rashed, Atsuko Miyaji, and Chunhua Su. "Probably Secure Keyed-Function Based Authenticated Encryption Schemes for Big Data." International Journal of Foundations of Computer Science 28, no. 06 (2017): 661–82. http://dx.doi.org/10.1142/s0129054117400123.
Повний текст джерелаKorchynskyi, Volodymyr, Valerii Hordiichuk, Vitalii Kildishev, Oleksandr Riabukha, Sergii Staikutsa, and Khaled Alfaiomi. "Method of information protection based on the integration of probabilistic encryption and noise immune coding." Radioelectronic and Computer Systems, no. 4 (December 6, 2023): 184–95. http://dx.doi.org/10.32620/reks.2023.4.13.
Повний текст джерелаAruna, M. G., and K. G. Mohan. "Secured cloud data migration technique by competent probabilistic public key encryption." China Communications 17, no. 5 (2020): 168–90. http://dx.doi.org/10.23919/jcc.2020.05.014.
Повний текст джерелаKulshrestha, Vartika, Seema Verma, and C. Rama Krishna. "Hybrid probabilistic triple encryption approach for data security in cloud computing." International Journal of Advanced Intelligence Paradigms 21, no. 1/2 (2022): 158. http://dx.doi.org/10.1504/ijaip.2022.121035.
Повний текст джерелаLeung, K. C., S. L. Li, L. M. Cheng, and C. K. Chan. "A Symmetric Probabilistic Encryption Scheme Based On CHNN Without Data Expansion." Neural Processing Letters 24, no. 2 (2006): 93–105. http://dx.doi.org/10.1007/s11063-006-9006-9.
Повний текст джерелаZhu, Li Juan. "A Network Identity Authentication Protocol Based on Fingerprint and Probabilistic Encryption of RSA." Applied Mechanics and Materials 241-244 (December 2012): 2471–74. http://dx.doi.org/10.4028/www.scientific.net/amm.241-244.2471.
Повний текст джерелаBystrevskii, Sergey A., Aleksei E. Borshevnikov, and Yuri V. Dobrzhinsky. "Data verification protocol for a confidential computing scheme with homomorphic encryption." Proceedings of Tomsk State University of Control Systems and Radioelectronics 27, no. 2 (2024): 31–36. http://dx.doi.org/10.21293/1818-0442-2024-27-2-31-36.
Повний текст джерелаKulshrestha, Vartika, Seema Verma, and C. Rama Krishna. "Hybrid Probabilistic Triple Encryption (HPRRA) Approach for Data Security in Cloud Computing." International Journal of Advanced Intelligence Paradigms 1, no. 1 (2021): 1. http://dx.doi.org/10.1504/ijaip.2021.10036005.
Повний текст джерелаDe, Mello Flavio, and José A. M. Xexéo. "Identifying Encryption Algorithms in ECB and CBC Modes Using Computational Intelligence." JUCS - Journal of Universal Computer Science 24, no. (1) (2018): 25–42. https://doi.org/10.3217/jucs-024-01-0025.
Повний текст джерелаZhang, Jing-Wen, Xiu-Bo Chen, Gang Xu, and Yi-Xian Yang. "Universal quantum circuit evaluation on encrypted data using probabilistic quantum homomorphic encryption scheme*." Chinese Physics B 30, no. 7 (2021): 070309. http://dx.doi.org/10.1088/1674-1056/ac003b.
Повний текст джерелаLuna, Jose Marcio, Chaouki T. Abdallah, and Gregory L. Heileman. "Probabilistic Optimization of Resource Distribution and Encryption for Data Storage in the Cloud." IEEE Transactions on Cloud Computing 6, no. 2 (2018): 428–39. http://dx.doi.org/10.1109/tcc.2016.2543728.
Повний текст джерелаRanadheer Reddy, Vallem. "SECURE DATA TRANSFER AND DETECTION FROM COUNTING BLOOM FILTER IN CLOUD COMPUTING." International Scientific Journal of Engineering and Management 04, no. 04 (2025): 1–7. https://doi.org/10.55041/isjem03096.
Повний текст джерелаGandhi, Mehak, and Kiranbir Kaur. "Enhancing Secure and Efficient Online Data Storage over Cloud Using Homomorphic with Probabilistic Encryption." International Journal of Computer Sciences and Engineering 6, no. 3 (2018): 263–68. http://dx.doi.org/10.26438/ijcse/v6i3.263268.
Повний текст джерелаWei, Hong Ru, and Ya Fei Zheng. "Algebraic Techniques in Linear Cryptanalysis." Advanced Materials Research 756-759 (September 2013): 3634–39. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.3634.
Повний текст джерелаEt.al, Quazi Warisha Ahmed. "Energetic Data Security Management Scheme using Hybrid Encryption Algorithm over Cloud Environment." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (2021): 201–8. http://dx.doi.org/10.17762/turcomat.v12i6.1289.
Повний текст джерелаAhmad, Fawad, Reshail Khan, and Armel Asongu Nkembi. "Improvement in the Interception Vulnerability Level of Encryption Mechanism in GSM." Inventions 10, no. 4 (2025): 56. https://doi.org/10.3390/inventions10040056.
Повний текст джерелаSenthil Kumar, K., and D. Malathi. "A Novel method to represent Access Tree structure by Context Free Grammar with and-or graph in Key Policy based Attribute based Encryption." International Journal of Engineering & Technology 7, no. 4.10 (2018): 396. http://dx.doi.org/10.14419/ijet.v7i4.10.20946.
Повний текст джерелаJayapandian, N., and A. M. J. Md Zubair Rahman. "Secure and efficient online data storage and sharing over cloud environment using probabilistic with homomorphic encryption." Cluster Computing 20, no. 2 (2017): 1561–73. http://dx.doi.org/10.1007/s10586-017-0809-4.
Повний текст джерелаFeilu Hang, Et al. "Design Of Intelligent Countermeasure System for Power System Network Security Defense." Journal of Electrical Systems 19, no. 4 (2024): 227–40. http://dx.doi.org/10.52783/jes.635.
Повний текст джерелаLi, Jun, Chenyang Zhang, Jianyi Zhang, and Yanhua Shao. "Research on Blockchain Transaction Privacy Protection Methods Based on Deep Learning." Future Internet 16, no. 4 (2024): 113. http://dx.doi.org/10.3390/fi16040113.
Повний текст джерелаTrivedi, Devharsh, Aymen Boudguiga, Nesrine Kaaniche, and Nikos Triandopoulos. "SigML++: Supervised Log Anomaly with Probabilistic Polynomial Approximation." Cryptography 7, no. 4 (2023): 52. http://dx.doi.org/10.3390/cryptography7040052.
Повний текст джерелаPrasanna Kumar M, Et al. "A Lightweight Security Model using Delta Probabilistic Hashing Technique for Secured Data Transmission in IoT Systems." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 10 (2023): 2097–107. http://dx.doi.org/10.17762/ijritcc.v11i10.8895.
Повний текст джерелаPrakash, A. John, and B. Lydia Elizabeth. "Pindex: Private multi-linked index for encrypted document retrieval." PLOS ONE 16, no. 8 (2021): e0256223. http://dx.doi.org/10.1371/journal.pone.0256223.
Повний текст джерелаDadheech, Pankaj, Abolfazl Mehbodniya, Shivam Tiwari, et al. "Zika Virus Prediction Using AI-Driven Technology and Hybrid Optimization Algorithm in Healthcare." Journal of Healthcare Engineering 2022 (January 12, 2022): 1–13. http://dx.doi.org/10.1155/2022/2793850.
Повний текст джерелаGu, Zhen, Guoyin Zhang, and Chen Yang. "Horizontally Partitioned Data Publication with Differential Privacy." Security and Communication Networks 2022 (July 31, 2022): 1–13. http://dx.doi.org/10.1155/2022/7963004.
Повний текст джерелаRocha, Bruno Santos, Jose Antonio Moreira Xexeo, and Renato Hidaka Torres. "Post-quantum cryptographic algorithm identification using machine learning." Journal of Information Security and Cryptography (Enigma) 9, no. 1 (2022): 1–8. http://dx.doi.org/10.17648/jisc.v9i1.81.
Повний текст джерелаSharov, Vladyslav, and Olena Nikulina. "LAYERED DEFENSE IN COMMUNICATION SYSTEMS: JOINT USE OF VPN PROTOCOLS AND LINEAR BLOCK CODES." Bulletin of National Technical University "KhPI". Series: System Analysis, Control and Information Technologies, no. 1 (13) (July 11, 2025): 112–16. https://doi.org/10.20998/2079-0023.2025.01.17.
Повний текст джерелаPinnapati, Surekha, and Prakasha Shivanna. "An efficient data compression and storage technique with key management authentication in cloud space." Indonesian Journal of Electrical Engineering and Computer Science 35, no. 3 (2024): 1680. http://dx.doi.org/10.11591/ijeecs.v35.i3.pp1680-1687.
Повний текст джерелаSurekha, Pinnapati Prakasha Shivanna. "An efficient data compression and storage technique with key management authentication in cloud space." Indonesian Journal of Electrical Engineering and Computer Science 35, no. 3 (2024): 1680–87. https://doi.org/10.11591/ijeecs.v35.i3.pp1680-1687.
Повний текст джерелаSolunke, Hiralal Bhaskar, Pawan Bhaladhare, and Amol Potgantwar. "Design of an iterative method for privacy : Preserving blockchain networks integrating dynamic routing with deep Q-networks and homomorphic encryption-based secure routing." Journal of Information and Optimization Sciences 46, no. 4-A (2025): 1081–90. https://doi.org/10.47974/jios-1893.
Повний текст джерелаKhadidos, Adil O., S. Shitharth, Alaa O. Khadidos, K. Sangeetha, and Khaled H. Alyoubi. "Healthcare Data Security Using IoT Sensors Based on Random Hashing Mechanism." Journal of Sensors 2022 (June 2, 2022): 1–17. http://dx.doi.org/10.1155/2022/8457116.
Повний текст джерелаNeamah Abbas, Farah, Mohanad Ridha Ghanim, and Rafal Naser Saleh. "Subject Review:AI-Driven Security in Quantum Machine Learning:Vulnerabilities,Threats, and Defenses." International Journal of Engineering Research and Advanced Technology 11, no. 04 (2025): 01–22. https://doi.org/10.31695/ijerat.2025.4.1.
Повний текст джерелаSu, Man Nam1 and Tae Ho Cho2. "A SECURITY METHOD FOR MULTIPLE ATTACKS IN SENSOR NETWORKS: AGAINST FALSE-REPORT INJECTION, FALSE-VOTE INJECTION, AND WORMHOLE ATTACKS." A SECURITY METHOD FOR MULTIPLE ATTACKS IN SENSOR NETWORKS: AGAINST FALSE-REPORT INJECTION, FALSE-VOTE INJECTION, AND WORMHOLE ATTACKS 02, dec (2014): 01–17. https://doi.org/10.5121/ieij.2014.2402.
Повний текст джерелаDhivya. R, B. Srinivasan. "Probabilistic Deming Deep Recursive Network and Schmidt-Samoa Cryptosystem for Cyber Attack Detection and Secure Transmission in Wireless Networks." Communications on Applied Nonlinear Analysis 32, no. 9s (2025): 1427–50. https://doi.org/10.52783/cana.v32.4167.
Повний текст джерелаMaheshbhai, Kansara. "Advancements in Cloud Database Migration: Current Innovations and Future Prospects for Scalable and Secure Transitions." Sage Science Review of Applied Machine Learning 7, no. 1 (2024): 127–43. https://doi.org/10.5281/zenodo.15033980.
Повний текст джерелаYu, Yun William, and Griffin M. Weber. "Balancing Accuracy and Privacy in Federated Queries of Clinical Data Repositories: Algorithm Development and Validation." Journal of Medical Internet Research 22, no. 11 (2020): e18735. http://dx.doi.org/10.2196/18735.
Повний текст джерелаSayeed, Aqsa, Chaman Verma, Neerendra Kumar, Neha Koul, and Zoltán Illés. "Approaches and Challenges in Internet of Robotic Things." Future Internet 14, no. 9 (2022): 265. http://dx.doi.org/10.3390/fi14090265.
Повний текст джерелаKjamilji, Artrim. "Techniques and Challenges while Applying Machine Learning Algorithms in Privacy Preserving Fashion." Proceeding International Conference on Science and Engineering 3 (April 30, 2020): xix. http://dx.doi.org/10.14421/icse.v3.600.
Повний текст джерела"Identity Based Data Sharing and Profile Matching using Probabilistic Key in Cloud." International Journal of Recent Technology and Engineering 8, no. 6 (2020): 3076–80. http://dx.doi.org/10.35940/ijrte.f8434.038620.
Повний текст джерела"A Symmetric Searchable Encryption Identification of Data on Probabilistic Trapdoors." International Journal of Engineering and Advanced Technology 9, no. 3 (2020): 3880–83. http://dx.doi.org/10.35940/ijeat.c6389.029320.
Повний текст джерелаNagnath, Ingale Ashwini. "A Modified Approach on Security Analysis Using Probabilistic Order Preserving Encryption Based on Cloud Data Serach." International Journal Of Engineering And Computer Science, January 30, 2017. http://dx.doi.org/10.18535/ijecs/v6i1.58.
Повний текст джерелаNaga Srinivasu, Parvathaneni, Ranjit Panigrahi, Ashish Singh, and Akash Kumar Bhoi. "Probabilistic Buckshot Driven Cluster Head Identification and Accumulative Data Encryption in WSN." Journal of Circuits, Systems and Computers, June 17, 2022. http://dx.doi.org/10.1142/s0218126622503030.
Повний текст джерела"Enhanced Security of Encrypted Text by KDMT: Key-Domain Maximization Technique." International Journal of Recent Technology and Engineering 8, no. 5 (2020): 1385–88. http://dx.doi.org/10.35940/ijrte.e6326.018520.
Повний текст джерелаM. Swetha and G. Appa Rao. "Hybrid Ensemble Lightweight Cryptosystem for Internet of Medical Things Security." International Journal of Computational and Experimental Science and Engineering 10, no. 4 (2024). https://doi.org/10.22399/ijcesen.625.
Повний текст джерелаAndreou, Andreas, Constandinos X. Mavromoustakis, George Mastorakis, et al. "Towards an optimized security approach to IoT devices with confidential healthcare data exchange." Multimedia Tools and Applications 80 (March 26, 2021). https://doi.org/10.1007/s11042-021-10827-x.
Повний текст джерелаJalasri, M., and L. Lakshmanan. "Managing data security in fog computing in IoT devices using noise framework encryption with power probabilistic clustering algorithm." Cluster Computing, May 17, 2022. http://dx.doi.org/10.1007/s10586-022-03606-2.
Повний текст джерелаThurairasu, Lisa, and Nelson Chong. "Information Management at a Health Services Research Organization in Toronto, Ontario, Canada: Moving from Identifiable Data to Coded Data." International Journal of Population Data Science 1, no. 1 (2017). http://dx.doi.org/10.23889/ijpds.v1i1.307.
Повний текст джерелаMoses, Oseghale Ikeakhe. "QUANTUM AI FOR NEXT-GENERATION SECURITY IN FINTECH, CYBERSECURITY, AND HEALTHCARE." International Journal of Engineering Technology Research & Management (ijetrm) 07, no. 08 (2023). https://doi.org/10.5281/zenodo.14837113.
Повний текст джерелаAnwarbasha, H., S. Sasi Kumar, and D. Dhanasekaran. "An efficient and secure protocol for checking remote data integrity in multi-cloud environment." Scientific Reports 11, no. 1 (2021). http://dx.doi.org/10.1038/s41598-021-93073-3.
Повний текст джерела