Добірка наукової літератури з теми "Symmetric encryption techniques"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Symmetric encryption techniques".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Symmetric encryption techniques"
Parenreng, Jumadi Mabe, Sahraeni Maulida Mustari, and Abdul Wahid. "E-mail Security System Using El-Gamal Hybrid Algorithm and AES (Advanced Encryption Standard) Algorithm." Internet of Things and Artificial Intelligence Journal 2, no. 1 (February 16, 2022): 1–9. http://dx.doi.org/10.31763/iota.v2i1.510.
Повний текст джерелаMalhotra, Anoushka, Ashwin Arora, and Dr Manjot Kaur Bhatia. "Symmetric Cryptographic Approaches." International Journal for Research in Applied Science and Engineering Technology 10, no. 12 (December 31, 2022): 718–21. http://dx.doi.org/10.22214/ijraset.2022.47982.
Повний текст джерелаChowdhary, Chiranji Lal, Pushpam Virenbhai Patel, Krupal Jaysukhbhai Kathrotia, Muhammad Attique, Kumaresan Perumal, and Muhammad Fazal Ijaz. "Analytical Study of Hybrid Techniques for Image Encryption and Decryption." Sensors 20, no. 18 (September 10, 2020): 5162. http://dx.doi.org/10.3390/s20185162.
Повний текст джерелаM, Sreekala, and Varghese Paul. "A Novel Hybrid Encryption Method for Multimedia Encryption Using Elliptic Curve Cryptography and TDMRC." International Journal of Emerging Research in Management and Technology 6, no. 7 (June 29, 2018): 1. http://dx.doi.org/10.23956/ijermt.v6i7.178.
Повний текст джерелаPushpendra, Tiwari. "A study and comparison of the various cryptography technique standards within fifteen factors." i-manager's Journal on Digital Forensics & Cyber Security 1, no. 1 (2023): 21. http://dx.doi.org/10.26634/jdf.1.1.19134.
Повний текст джерелаKuppuswamy, Prakash, Saeed Qasim Yahya Al Khalidi Al-Maliki, Rajan John, Mohammad Haseebuddin, and Ahmed Ali Shaik Meeran. "A hybrid encryption system for communication and financial transactions using RSA and a novel symmetric key algorithm." Bulletin of Electrical Engineering and Informatics 12, no. 2 (April 1, 2023): 1148–58. http://dx.doi.org/10.11591/eei.v12i2.4967.
Повний текст джерелаAhamad, Md Martuza, and Md Ibrahim Abdullah. "Comparison of Encryption Algorithms for Multimedia." Rajshahi University Journal of Science and Engineering 44 (November 19, 2016): 131–39. http://dx.doi.org/10.3329/rujse.v44i0.30398.
Повний текст джерелаZhu, Bingxin, Puwen Wei, and Mingqiang Wang. "Adaptive Security of Broadcast Encryption, Revisited." Security and Communication Networks 2017 (2017): 1–16. http://dx.doi.org/10.1155/2017/1404279.
Повний текст джерелаParveen Sehgal, Satinder ,. "Design a Hybrid Algorithm for Data Encryption to Implementation in Database." Tuijin Jishu/Journal of Propulsion Technology 44, no. 4 (October 16, 2023): 1328–37. http://dx.doi.org/10.52783/tjjpt.v44.i4.1037.
Повний текст джерелаUbaidullah, Mohammad, and Qahtan Makki. "A Review on Symmetric Key Encryption Techniques in Cryptography." International Journal of Computer Applications 147, no. 10 (August 16, 2016): 43–48. http://dx.doi.org/10.5120/ijca2016911203.
Повний текст джерелаДисертації з теми "Symmetric encryption techniques"
Jha, Pawan Kumar. "AN APPROACH TOWARDS DESIGN AND IMPLEMENTATION OF SYMMETRIC ENCRYPTION TECHNIQUES." Thesis, University of North Bengal, 2006. http://hdl.handle.net/123456789/11.
Повний текст джерелаGuruswamy, Aarumugam Bhupathi Rajan. "Independent Domain of Symmetric Encryption using Least SignificantBit : Computer Vision, Steganography and Cryptography Techniques." Thesis, Högskolan Dalarna, Datateknik, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:du-10063.
Повний текст джерелаShin, Dong Il. "Improving trust and securing data accessibility for e-health decision making by using data encryption techniques." Thesis, Queensland University of Technology, 2012. https://eprints.qut.edu.au/50636/1/Dong_Il_Shin_Thesis.pdf.
Повний текст джерелаMadhavarapu, Venkata Praveen Kumar. "A Novel Three Phase Symmetric Cipher Technique." OpenSIUC, 2016. https://opensiuc.lib.siu.edu/theses/2031.
Повний текст джерелаLin, Chun-Fang, and 林椿芳. "Research and Implementation of E-Voting System with IC Cards and ID-based Encryption Scheme Based on Symmetric-Key Technique with a Trusted Device." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/37609861755636278972.
Повний текст джерела國立高雄師範大學
資訊教育研究所
96
Electors can express the public opinion by electoral voting in the democratic society, and paper-based voting is the most common way in Taiwan. However, if the seal is not clear enough, it may bring some debate on the result; the low efficiency in recording and counting of ballots is another problem. E-voting is widespread in some countries and has excellent effects, so it is worth to learn their experiences. We compare various foreign E-voting systems and analyze the criteria for design and implement an E-voting system with IC card. On the other hand, people transmit their message frequently as information technology has been developed rapidly nowadays, and there are many security issue appeared. The concept of IST, which was proposed by Fukaya and Sakurai, can not only avoid accessing or eavesdropping from unauthorized users, but also reduce the cost of transmission, computation, and storage. IST is abbreviated from ID-based encryption scheme based on symmetric-key technique with a trusted device. This encryption scheme combines tamper-free device with user's identity to achieve ID-based cryptosystem that can provide a high efficient authenticated encryption scheme, and there is no more trouble with memorizing several combinations of users' accounts and passwords. In this research, we implement the IST concept for a GUI tool on Windows platform for its accessibility, and we improve its security and usability by incorporating Java Card into our system.
Книги з теми "Symmetric encryption techniques"
Harris, Steven. HENMOtP PT001 2021: Unbreakable Symmetric Encryption One Time Pad for Private Person to Person Messages. Knowledge Publications Corporation, 2021.
Знайти повний текст джерелаЧастини книг з теми "Symmetric encryption techniques"
Mikhalev, Vasily, Miodrag J. Mihaljević, Orhun Kara, and Frederik Armknecht. "Selected Design and Analysis Techniques for Contemporary Symmetric Encryption." In Security of Ubiquitous Computing Systems, 49–62. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-10591-4_3.
Повний текст джерелаAlhayani, Mohammed, and Muhmmad Al-Khiza’ay. "Analyze Symmetric and Asymmetric Encryption Techniques by Securing Facial Recognition System." In Lecture Notes on Data Engineering and Communications Technologies, 97–105. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-15191-0_10.
Повний текст джерелаLi, Lin, Chungen Xu, Zhongyi Liu, and Lin Mei. "Forward Secure Conjunctive-Keyword Searchable Symmetric Encryption Using Shamir Threshold Secret Sharing Scheme." In Applications and Techniques in Information Security, 14–28. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-33-4706-9_2.
Повний текст джерелаParashar, Deepika, Satyabrata Roy, Nilanjan Dey, Vipin Jain, and U. S. Rawat. "Symmetric Key Encryption Technique: A Cellular Automata Based Approach." In Advances in Intelligent Systems and Computing, 59–67. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8536-9_7.
Повний текст джерелаChandra, Sourabh, Smita Paira, Sk Safikul Alam, and Siddhartha Bhattacharyya. "A Rotation Based Encryption Technique Using Symmetric Key Method." In Emerging Research in Computing, Information, Communication and Applications, 21–28. New Delhi: Springer India, 2015. http://dx.doi.org/10.1007/978-81-322-2550-8_3.
Повний текст джерелаMante, Pratik Gajanan, Harsh Rajendra Oswal, Debabrata Swain, and Deepali Deshpande. "A Symmetrical Encryption Technique for Text Encryption Using Randomized Matrix Based Key Generation." In Advances in Data Science and Management, 137–48. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-0978-0_13.
Повний текст джерелаLalitha, R. V. S. S., and P. Naga Srinivasu. "An Efficient Data Encryption Through Image via Prime Order Symmetric Key and Bit Shuffle Technique." In Lecture Notes in Networks and Systems, 261–70. Singapore: Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-3226-4_26.
Повний текст джерелаChander, Bhanu. "The State-of-the-Art Cryptography Techniques for Secure Data Transmission." In Handbook of Research on Intrusion Detection Systems, 284–305. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2242-4.ch014.
Повний текст джерелаNishchal, Naveen K. "Optical techniques of image encryption: symmetric cryptosystems." In Optical Cryptosystems. IOP Publishing, 2019. http://dx.doi.org/10.1088/978-0-7503-2220-1ch2.
Повний текст джерелаSivasakthi, M., and A. Meenakshi. "Machine Learning Techniques to Predict the Inputs in Symmetric Encryption Algorithm." In Innovative Machine Learning Applications for Cryptography, 163–72. IGI Global, 2024. http://dx.doi.org/10.4018/979-8-3693-1642-9.ch009.
Повний текст джерелаТези доповідей конференцій з теми "Symmetric encryption techniques"
Dash, Sasmita, Jayanta Mondal, and Debabala Swain. "A survey on symmetric text encryption techniques." In MACHINE LEARNING AND INFORMATION PROCESSING: PROCEEDINGS OF ICMLIP 2023. AIP Publishing, 2023. http://dx.doi.org/10.1063/5.0182894.
Повний текст джерелаKaushik, Shweta, and Charu Gandhi. "Cloud data security with hybrid symmetric encryption." In 2016 International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT). IEEE, 2016. http://dx.doi.org/10.1109/icctict.2016.7514656.
Повний текст джерелаShruthy, V. N. Jaya, and V. Maheswari. "A hybrid fusion of symmetric encryption techniques with graph labeling." In 2ND INTERNATIONAL CONFERENCE ON MATHEMATICAL TECHNIQUES AND APPLICATIONS: ICMTA2021. AIP Publishing, 2022. http://dx.doi.org/10.1063/5.0108509.
Повний текст джерелаDamasceno, Kayque, Carlos Cruz, Anderson De Oliveira, and Luís De Castro. "Alternative N-bit Key Data Encryption for Block Ciphers." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação, 2019. http://dx.doi.org/10.5753/sbseg.2019.13990.
Повний текст джерелаAgnihotri, Nishant, and Aman Kumar Sharma. "Comparative Analysis of Different Symmetric Encryption Techniques Based on Computation Time." In 2020 Sixth International Conference on Parallel, Distributed and Grid Computing (PDGC). IEEE, 2020. http://dx.doi.org/10.1109/pdgc50313.2020.9315848.
Повний текст джерелаYadav, Vikas, and Manoj Kumar. "A Hybrid Cryptography Approach Using Symmetric, Asymmetric and DNA Based Encryption." In 2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT). IEEE, 2023. http://dx.doi.org/10.1109/icct56969.2023.10076124.
Повний текст джерелаSilveira, Matheus M., Danielle S. Silva, Luiz Z. Oliveira, and Rafael L. Gomes. "Analyzing the Performance of Searchable Symmetric Encryption over Huawei Cloud." In Anais Estendidos do Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos. Sociedade Brasileira de Computação - SBC, 2023. http://dx.doi.org/10.5753/sbrc_estendido.2023.465.
Повний текст джерелаShruthy, V. N. Jaya, and V. Maheswari. "A hybrid combination of symmetric and asymmetric encryption technique with graph labeling." In 2ND INTERNATIONAL CONFERENCE ON MATHEMATICAL TECHNIQUES AND APPLICATIONS: ICMTA2021. AIP Publishing, 2022. http://dx.doi.org/10.1063/5.0108506.
Повний текст джерелаKrishna Rao, Akula Vamsi, V. N. Aditya Datta Chivukula, Sri Keshava Reddy Adupala, and Abhiram Reddy Cholleti. "Multi-Layer Encryption Algorithm." In 7th International Conference on VLSI and Applications (VLSIA 2021). Academy and Industry Research Collaboration Center (AIRCC), 2021. http://dx.doi.org/10.5121/csit.2021.112103.
Повний текст джерелаJintcharadze, Elza, Tsitsino Sarajishvili, Anna Surmanidze, and Davit Khojava. "Implementation and Comparative Analysis of Symmetric Encryption Model Based on Substitution Cipher Techniques." In 2021 IEEE East-West Design & Test Symposium (EWDTS). IEEE, 2021. http://dx.doi.org/10.1109/ewdts52692.2021.9580978.
Повний текст джерела