Статті в журналах з теми "Probabilistic data encryption"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-27 статей у журналах для дослідження на тему "Probabilistic data encryption".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Mazumder, Rashed, Atsuko Miyaji, and Chunhua Su. "Probably Secure Keyed-Function Based Authenticated Encryption Schemes for Big Data." International Journal of Foundations of Computer Science 28, no. 06 (September 2017): 661–82. http://dx.doi.org/10.1142/s0129054117400123.
Повний текст джерелаLeung, K. C., S. L. Li, L. M. Cheng, and C. K. Chan. "A Symmetric Probabilistic Encryption Scheme Based On CHNN Without Data Expansion." Neural Processing Letters 24, no. 2 (September 20, 2006): 93–105. http://dx.doi.org/10.1007/s11063-006-9006-9.
Повний текст джерелаAruna, M. G., and K. G. Mohan. "Secured cloud data migration technique by competent probabilistic public key encryption." China Communications 17, no. 5 (May 2020): 168–90. http://dx.doi.org/10.23919/jcc.2020.05.014.
Повний текст джерелаKulshrestha, Vartika, Seema Verma, and C. Rama Krishna. "Hybrid probabilistic triple encryption approach for data security in cloud computing." International Journal of Advanced Intelligence Paradigms 21, no. 1/2 (2022): 158. http://dx.doi.org/10.1504/ijaip.2022.121035.
Повний текст джерелаZhu, Li Juan. "A Network Identity Authentication Protocol Based on Fingerprint and Probabilistic Encryption of RSA." Applied Mechanics and Materials 241-244 (December 2012): 2471–74. http://dx.doi.org/10.4028/www.scientific.net/amm.241-244.2471.
Повний текст джерелаKulshrestha, Vartika, Seema Verma, and C. Rama Krishna. "Hybrid Probabilistic Triple Encryption (HPRRA) Approach for Data Security in Cloud Computing." International Journal of Advanced Intelligence Paradigms 1, no. 1 (2021): 1. http://dx.doi.org/10.1504/ijaip.2021.10036005.
Повний текст джерелаLuna, Jose Marcio, Chaouki T. Abdallah, and Gregory L. Heileman. "Probabilistic Optimization of Resource Distribution and Encryption for Data Storage in the Cloud." IEEE Transactions on Cloud Computing 6, no. 2 (April 1, 2018): 428–39. http://dx.doi.org/10.1109/tcc.2016.2543728.
Повний текст джерелаZhang, Jing-Wen, Xiu-Bo Chen, Gang Xu, and Yi-Xian Yang. "Universal quantum circuit evaluation on encrypted data using probabilistic quantum homomorphic encryption scheme*." Chinese Physics B 30, no. 7 (July 1, 2021): 070309. http://dx.doi.org/10.1088/1674-1056/ac003b.
Повний текст джерелаGandhi, Mehak, and Kiranbir Kaur. "Enhancing Secure and Efficient Online Data Storage over Cloud Using Homomorphic with Probabilistic Encryption." International Journal of Computer Sciences and Engineering 6, no. 3 (March 30, 2018): 263–68. http://dx.doi.org/10.26438/ijcse/v6i3.263268.
Повний текст джерелаEt.al, Quazi Warisha Ahmed. "Energetic Data Security Management Scheme using Hybrid Encryption Algorithm over Cloud Environment." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (April 10, 2021): 201–8. http://dx.doi.org/10.17762/turcomat.v12i6.1289.
Повний текст джерелаJayapandian, N., and A. M. J. Md Zubair Rahman. "Secure and efficient online data storage and sharing over cloud environment using probabilistic with homomorphic encryption." Cluster Computing 20, no. 2 (March 29, 2017): 1561–73. http://dx.doi.org/10.1007/s10586-017-0809-4.
Повний текст джерелаWei, Hong Ru, and Ya Fei Zheng. "Algebraic Techniques in Linear Cryptanalysis." Advanced Materials Research 756-759 (September 2013): 3634–39. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.3634.
Повний текст джерелаSenthil Kumar, K., and D. Malathi. "A Novel method to represent Access Tree structure by Context Free Grammar with and-or graph in Key Policy based Attribute based Encryption." International Journal of Engineering & Technology 7, no. 4.10 (October 2, 2018): 396. http://dx.doi.org/10.14419/ijet.v7i4.10.20946.
Повний текст джерелаPrakash, A. John, and B. Lydia Elizabeth. "Pindex: Private multi-linked index for encrypted document retrieval." PLOS ONE 16, no. 8 (August 20, 2021): e0256223. http://dx.doi.org/10.1371/journal.pone.0256223.
Повний текст джерелаDadheech, Pankaj, Abolfazl Mehbodniya, Shivam Tiwari, Sarvesh Kumar, Pooja Singh, Sweta Gupta, and Henry kwame Atiglah. "Zika Virus Prediction Using AI-Driven Technology and Hybrid Optimization Algorithm in Healthcare." Journal of Healthcare Engineering 2022 (January 12, 2022): 1–13. http://dx.doi.org/10.1155/2022/2793850.
Повний текст джерелаYu, Yun William, and Griffin M. Weber. "Balancing Accuracy and Privacy in Federated Queries of Clinical Data Repositories: Algorithm Development and Validation." Journal of Medical Internet Research 22, no. 11 (November 3, 2020): e18735. http://dx.doi.org/10.2196/18735.
Повний текст джерелаKjamilji, Artrim. "Techniques and Challenges while Applying Machine Learning Algorithms in Privacy Preserving Fashion." Proceeding International Conference on Science and Engineering 3 (April 30, 2020): xix. http://dx.doi.org/10.14421/icse.v3.600.
Повний текст джерела"Identity Based Data Sharing and Profile Matching using Probabilistic Key in Cloud." International Journal of Recent Technology and Engineering 8, no. 6 (March 30, 2020): 3076–80. http://dx.doi.org/10.35940/ijrte.f8434.038620.
Повний текст джерела"A Symmetric Searchable Encryption Identification of Data on Probabilistic Trapdoors." International Journal of Engineering and Advanced Technology 9, no. 3 (February 29, 2020): 3880–83. http://dx.doi.org/10.35940/ijeat.c6389.029320.
Повний текст джерелаNagnath, Ingale Ashwini. "A Modified Approach on Security Analysis Using Probabilistic Order Preserving Encryption Based on Cloud Data Serach." International Journal Of Engineering And Computer Science, January 30, 2017. http://dx.doi.org/10.18535/ijecs/v6i1.58.
Повний текст джерела"Enhanced Security of Encrypted Text by KDMT: Key-Domain Maximization Technique." International Journal of Recent Technology and Engineering 8, no. 5 (January 30, 2020): 1385–88. http://dx.doi.org/10.35940/ijrte.e6326.018520.
Повний текст джерелаJalasri, M., and L. Lakshmanan. "Managing data security in fog computing in IoT devices using noise framework encryption with power probabilistic clustering algorithm." Cluster Computing, May 17, 2022. http://dx.doi.org/10.1007/s10586-022-03606-2.
Повний текст джерелаThurairasu, Lisa, and Nelson Chong. "Information Management at a Health Services Research Organization in Toronto, Ontario, Canada: Moving from Identifiable Data to Coded Data." International Journal of Population Data Science 1, no. 1 (April 19, 2017). http://dx.doi.org/10.23889/ijpds.v1i1.307.
Повний текст джерелаAnwarbasha, H., S. Sasi Kumar, and D. Dhanasekaran. "An efficient and secure protocol for checking remote data integrity in multi-cloud environment." Scientific Reports 11, no. 1 (July 2, 2021). http://dx.doi.org/10.1038/s41598-021-93073-3.
Повний текст джерелаDerler, David, Kai Gellert, Tibor Jager, Daniel Slamanig, and Christoph Striecks. "Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange." Journal of Cryptology 34, no. 2 (March 9, 2021). http://dx.doi.org/10.1007/s00145-021-09374-3.
Повний текст джерелаLiu, Yiming, Qi Zeng, Yue Zhao, Kaijun Wu, and Yao Hao. "Novel channel-hopping pattern-based wireless IoT networks in smart cities for reducing multi-access interference and jamming attacks." EURASIP Journal on Wireless Communications and Networking 2021, no. 1 (July 13, 2021). http://dx.doi.org/10.1186/s13638-021-02029-8.
Повний текст джерелаSchnell, Rainer, and Christian Borgs. "Proof of Concept for a Privacy Preserving National Mortality Register." International Journal of Population Data Science 3, no. 4 (August 29, 2018). http://dx.doi.org/10.23889/ijpds.v3i4.732.
Повний текст джерела